Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
02/02/2024, 22:32
Static task
static1
Behavioral task
behavioral1
Sample
da1c48fb35cfcd6cf7992f28050b5d4f3df326bfc32bcfce45e57f000abe6ca5.vbs
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
da1c48fb35cfcd6cf7992f28050b5d4f3df326bfc32bcfce45e57f000abe6ca5.vbs
Resource
win10v2004-20231215-en
General
-
Target
da1c48fb35cfcd6cf7992f28050b5d4f3df326bfc32bcfce45e57f000abe6ca5.vbs
-
Size
7KB
-
MD5
49ffe88201d191db2f30b70a42fd85b1
-
SHA1
e011ce4b873ba696bf358c38bd7b768b38e45622
-
SHA256
da1c48fb35cfcd6cf7992f28050b5d4f3df326bfc32bcfce45e57f000abe6ca5
-
SHA512
11a8904ba1a72793b715bc9108e8dd8de0babe2f7368c42f632856cf189ee7d77d7a347d062be5ad6bdb6770f412604c9828f3cf38cd2f1aab2d576a061c3224
-
SSDEEP
96:PNF+PyG/zq2CYnfAyKG/zKqRuX+jzlGjUBH:PNF+Pp/zq2lnfAyB/z1cYzlGjUBH
Malware Config
Signatures
-
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 2568 attrib.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\cmdfile.bat cmd.exe File opened for modification C:\Windows\cmdfile.bat cmd.exe File created C:\Windows\desktray.vbs cmd.exe File opened for modification C:\Windows\desktray.vbs cmd.exe File opened for modification C:\Windows\cmdfile.bat attrib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2060 wrote to memory of 2716 2060 WScript.exe 28 PID 2060 wrote to memory of 2716 2060 WScript.exe 28 PID 2060 wrote to memory of 2716 2060 WScript.exe 28 PID 2716 wrote to memory of 2796 2716 cmd.exe 30 PID 2716 wrote to memory of 2796 2716 cmd.exe 30 PID 2716 wrote to memory of 2796 2716 cmd.exe 30 PID 2716 wrote to memory of 2820 2716 cmd.exe 31 PID 2716 wrote to memory of 2820 2716 cmd.exe 31 PID 2716 wrote to memory of 2820 2716 cmd.exe 31 PID 2716 wrote to memory of 2764 2716 cmd.exe 32 PID 2716 wrote to memory of 2764 2716 cmd.exe 32 PID 2716 wrote to memory of 2764 2716 cmd.exe 32 PID 2716 wrote to memory of 2700 2716 cmd.exe 33 PID 2716 wrote to memory of 2700 2716 cmd.exe 33 PID 2716 wrote to memory of 2700 2716 cmd.exe 33 PID 2716 wrote to memory of 1696 2716 cmd.exe 34 PID 2716 wrote to memory of 1696 2716 cmd.exe 34 PID 2716 wrote to memory of 1696 2716 cmd.exe 34 PID 2716 wrote to memory of 2736 2716 cmd.exe 35 PID 2716 wrote to memory of 2736 2716 cmd.exe 35 PID 2716 wrote to memory of 2736 2716 cmd.exe 35 PID 2716 wrote to memory of 2568 2716 cmd.exe 36 PID 2716 wrote to memory of 2568 2716 cmd.exe 36 PID 2716 wrote to memory of 2568 2716 cmd.exe 36 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2568 attrib.exe
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\da1c48fb35cfcd6cf7992f28050b5d4f3df326bfc32bcfce45e57f000abe6ca5.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\System32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\W5.bat" "2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" ver"3⤵PID:2796
-
-
C:\Windows\system32\find.exeFind /i "xP"3⤵PID:2820
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" if erRORLEvEL1 CTtY NuL"3⤵PID:2764
-
-
C:\Windows\system32\find.exefind "vh"3⤵PID:2700
-
-
C:\Windows\system32\find.exefind /i /v "run"3⤵PID:1696
-
-
C:\Windows\system32\cscript.execscript C:\Users\Admin\AppData\Local\Temp\nFE3jMWO.vbs3⤵PID:2736
-
-
C:\Windows\system32\attrib.exeattrib +r +s +h C:\Windows\cmdfile.bat3⤵
- Sets file to hidden
- Drops file in Windows directory
- Views/modifies file attributes
PID:2568
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5badd9d9ef0d1f51b81d8376cff6accf6
SHA1a9eec7a55b018a7c66db9edc0352a87e53bf106b
SHA256ef87f069994abf6bffa3fcb38912c6c5af70094cb5243a28d49a6148027c480f
SHA5125fbde6f289e11bf449aa8c092b12b999a0facfa31dbed25776a28b0159e48380c3724d111bb2ed4df3c4c02f39826c846520ed676b6afaaf42b261bcbb3e46e1
-
Filesize
426B
MD59f9f37584540e801d0c9a9d5aa359c4a
SHA1c1d4db9f38f316f4faaead11a5a6dae02a4d4ca7
SHA2567ebe729e5fcb70dba18e2c2182927b203397522ccc1c850178d9a541f216cd76
SHA5124a5791dc00797615afea40f05c840d52f139428efa944c51c0d7b491edf793c9cd3d9c10dbffc1cab4be1a48f464a532e550c04018d0859a12e34fa211ee600c
-
Filesize
2KB
MD5bbd9ef37a81669f9175f2b6ee25578ad
SHA12a7bf3255cf9fefb7a27a2646500c7de86c8e9a9
SHA256bbf798610776e34a949e8ff6848b950fe587f95a7ac45cc47c60359c55fdf38d
SHA51291265d77d92440023d71fd17404c2ee3842ae5bc0800674f7cbed60fcdd20c9efdbc535406f69d69be7b7eff0d4d01a33150e0840e39f91b1a3c35616b92f67c