Analysis
-
max time kernel
91s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
02/02/2024, 22:32
Static task
static1
Behavioral task
behavioral1
Sample
dcce5e78bbb430007d84cf51551750344495097e4a05ca57dcbcc7d90ce553f3.vbs
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
dcce5e78bbb430007d84cf51551750344495097e4a05ca57dcbcc7d90ce553f3.vbs
Resource
win10v2004-20231222-en
General
-
Target
dcce5e78bbb430007d84cf51551750344495097e4a05ca57dcbcc7d90ce553f3.vbs
-
Size
4KB
-
MD5
c59dfb0c3d15566c9938c67faf981bad
-
SHA1
4ad260509f42a40d96653a2caa3b32518ab3e0b0
-
SHA256
dcce5e78bbb430007d84cf51551750344495097e4a05ca57dcbcc7d90ce553f3
-
SHA512
a43d463c12d352d6665b23c3ac3faec139bc8bdcc0cd890abda819b92ee886d81d85d25d54c14e12ca0917eb9fbb6377adfd4909b6abcafec3e5cee9b07324d5
-
SSDEEP
96:VNnTODUQidYY7k4H1RnPHjRx85gFhk2gaprFVK6SzpBN0BcJzIa+FREz95:VJODukSJh3Az+FR8
Malware Config
Signatures
-
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\Microsoft.vbs WScript.exe File created C:\Windows\Microsoft.txt WScript.exe File opened for modification C:\Windows\Application Data\Microsoft\Internet Explorer\desktop.htt WScript.exe File created C:\Windows\Microsoft.vbs WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Internet Explorer\Main WScript.exe Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Internet Explorer\Desktop\General WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\Desktop\General\Wallpaper = "C:\\Windows\\Application Data\\Microsoft\\Internet Explorer\\Wallpapr.htt" WScript.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://www.latinguia.com/buscar/avanzada.phtml?query=Costa+Rica&first=0&combination=phrase&spanish=yes&filter1_arg=Must:&filter1_form=words:&filter1=&filter2_arg=Must:&filter2_form=words:&filter2=&date_type=within&date_when=0&date_relation=older&date_month=1&date_day=1&date_year=1999&feature_ext=&area=continent&continent=all&domain=&pagetype=any&depth=&numresults=10&format=long&x=47&y=10" WScript.exe -
Modifies data under HKEY_USERS 7 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\Desktop WScript.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\Desktop\General\Wallpaper = "C:\\Windows\\Application Data\\Microsoft\\Internet Explorer\\Wallpapr.htt" WScript.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\Desktop\General WScript.exe Key created \REGISTRY\USER\.DEFAULT WScript.exe Key created \REGISTRY\USER\.DEFAULT\Software WScript.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft WScript.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer WScript.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Edit\Command WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Edit\Command\ = "C:\\Windows\\Notepad.exe %C:\\Windows\\Microsoft.txt" WScript.exe
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\dcce5e78bbb430007d84cf51551750344495097e4a05ca57dcbcc7d90ce553f3.vbs"1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies data under HKEY_USERS
- Modifies registry class
PID:1176