Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
02-02-2024 22:14
Static task
static1
Behavioral task
behavioral1
Sample
a398dc51997020f58391c14df28f2ff3c0fab5441a02392198c4f8c4eadf0647.vbs
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
a398dc51997020f58391c14df28f2ff3c0fab5441a02392198c4f8c4eadf0647.vbs
Resource
win10v2004-20231222-en
General
-
Target
a398dc51997020f58391c14df28f2ff3c0fab5441a02392198c4f8c4eadf0647.vbs
-
Size
5KB
-
MD5
cea2abd74d72709fa6b90172997e0aea
-
SHA1
bb61857a4831a50400ff51519c74b63ae987441a
-
SHA256
a398dc51997020f58391c14df28f2ff3c0fab5441a02392198c4f8c4eadf0647
-
SHA512
bbcadf063b54a4c7db30aff1ecb2aab9ca57750c68450b0f248e43b3f61502386e3f041a6819629c821235d524ed3d7181980fbea2c2dbe93a2616f7c473bf0d
-
SSDEEP
96:1Qt0p9Ab5yJcp/0WcXStgE2j208h6OEelg/p5rOBzFcR+Wg75tOBPFcR+WghWE:1PwGMgE2jXC66WrfgWMtbgWMn
Malware Config
Signatures
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Blocklisted process makes network request 2 IoCs
flow pid Process 4 2668 WScript.exe 7 2668 WScript.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AdminSoft = "c:\\Windows\\System32\\sysfile.vbs" WScript.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\System32\sysfile.vbs WScript.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created \??\c:\windows\cd.exe WScript.exe File created \??\c:\windows\hidestart.exe WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 2668 wrote to memory of 3024 2668 WScript.exe 28 PID 2668 wrote to memory of 3024 2668 WScript.exe 28 PID 2668 wrote to memory of 3024 2668 WScript.exe 28 PID 2668 wrote to memory of 2796 2668 WScript.exe 30 PID 2668 wrote to memory of 2796 2668 WScript.exe 30 PID 2668 wrote to memory of 2796 2668 WScript.exe 30 PID 2668 wrote to memory of 2780 2668 WScript.exe 32 PID 2668 wrote to memory of 2780 2668 WScript.exe 32 PID 2668 wrote to memory of 2780 2668 WScript.exe 32 PID 2796 wrote to memory of 2700 2796 net.exe 36 PID 2796 wrote to memory of 2700 2796 net.exe 36 PID 2796 wrote to memory of 2700 2796 net.exe 36 PID 2780 wrote to memory of 2804 2780 net.exe 35 PID 2780 wrote to memory of 2804 2780 net.exe 35 PID 2780 wrote to memory of 2804 2780 net.exe 35 PID 3024 wrote to memory of 2612 3024 net.exe 34 PID 3024 wrote to memory of 2612 3024 net.exe 34 PID 3024 wrote to memory of 2612 3024 net.exe 34 PID 2668 wrote to memory of 2232 2668 WScript.exe 37 PID 2668 wrote to memory of 2232 2668 WScript.exe 37 PID 2668 wrote to memory of 2232 2668 WScript.exe 37 PID 2232 wrote to memory of 2560 2232 net.exe 39 PID 2232 wrote to memory of 2560 2232 net.exe 39 PID 2232 wrote to memory of 2560 2232 net.exe 39 PID 2668 wrote to memory of 1516 2668 WScript.exe 41 PID 2668 wrote to memory of 1516 2668 WScript.exe 41 PID 2668 wrote to memory of 1516 2668 WScript.exe 41 PID 1516 wrote to memory of 860 1516 net.exe 43 PID 1516 wrote to memory of 860 1516 net.exe 43 PID 1516 wrote to memory of 860 1516 net.exe 43 PID 2668 wrote to memory of 2136 2668 WScript.exe 44 PID 2668 wrote to memory of 2136 2668 WScript.exe 44 PID 2668 wrote to memory of 2136 2668 WScript.exe 44 PID 2136 wrote to memory of 1720 2136 net.exe 46 PID 2136 wrote to memory of 1720 2136 net.exe 46 PID 2136 wrote to memory of 1720 2136 net.exe 46 PID 2668 wrote to memory of 2960 2668 WScript.exe 47 PID 2668 wrote to memory of 2960 2668 WScript.exe 47 PID 2668 wrote to memory of 2960 2668 WScript.exe 47 PID 2960 wrote to memory of 2856 2960 net.exe 49 PID 2960 wrote to memory of 2856 2960 net.exe 49 PID 2960 wrote to memory of 2856 2960 net.exe 49
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\a398dc51997020f58391c14df28f2ff3c0fab5441a02392198c4f8c4eadf0647.vbs"1⤵
- Blocklisted process makes network request
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" user startbug /add2⤵
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user startbug /add3⤵PID:2612
-
-
-
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" user startbug startbug /add2⤵
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user startbug startbug /add3⤵PID:2700
-
-
-
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" localgroup administrators startbug /add2⤵
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup administrators startbug /add3⤵PID:2804
-
-
-
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" stop themes2⤵
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop themes3⤵PID:2560
-
-
-
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" start themes2⤵
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start themes3⤵PID:860
-
-
-
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" stop themes2⤵
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop themes3⤵PID:1720
-
-
-
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" start themes2⤵
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start themes3⤵PID:2856
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD50ddd9bd4460b827dbf6b20dbf17fd04c
SHA111a0ddcf0b168fb859745d97cd28864e84496c08
SHA256f99c7a088a444339d97a12b5342bc31914a43253ff2ea8b62d36cb30b438e0eb
SHA512179e5e0fae812ab84f6a74db0949e02998f83e32f6b4f679171cb4e2133c333febe682b5b044feef5562661f60ef8ba842657859101ebcf26d5f82f75cba2088