Analysis

  • max time kernel
    149s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    04/02/2024, 17:19

General

  • Target

    sample.vbs

  • Size

    2KB

  • MD5

    615a12fc8b7f5280959581d0c9cd1022

  • SHA1

    6d11b5dc446a357f6ca7b64d1feadeea91b51a92

  • SHA256

    7ae6a2ed2e4f32425c496162b8c46979d7326094d294011c5535ef83b51a3891

  • SHA512

    50560c9c6dd1d6f6c186d1022337d802a12724f558683f47c67d7420a19aa12f389634d2803a41234b12c596088a209a4fb8dae468e73e280820760b1b319b19

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 25 IoCs
  • Runs regedit.exe 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\sample.vbs"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2396
    • C:\Windows\regedit.exe
      "C:\Windows\regedit.exe"
      2⤵
      • Runs regedit.exe
      PID:2256
    • C:\Windows\System32\taskmgr.exe
      "C:\Windows\System32\taskmgr.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2684
    • C:\Windows\System32\notepad.exe
      "C:\Windows\System32\notepad.exe"
      2⤵
        PID:2260
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe"
        2⤵
          PID:2592
        • C:\Windows\regedit.exe
          "C:\Windows\regedit.exe"
          2⤵
          • Runs regedit.exe
          PID:2620
        • C:\Windows\System32\taskmgr.exe
          "C:\Windows\System32\taskmgr.exe"
          2⤵
            PID:2568
          • C:\Windows\System32\notepad.exe
            "C:\Windows\System32\notepad.exe"
            2⤵
              PID:2580
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe"
              2⤵
                PID:2632
              • C:\Windows\System32\taskmgr.exe
                "C:\Windows\System32\taskmgr.exe"
                2⤵
                  PID:2056
                • C:\Windows\regedit.exe
                  "C:\Windows\regedit.exe"
                  2⤵
                  • Runs regedit.exe
                  PID:1168
                • C:\Windows\System32\notepad.exe
                  "C:\Windows\System32\notepad.exe"
                  2⤵
                    PID:2124
                  • C:\Windows\System32\cmd.exe
                    "C:\Windows\System32\cmd.exe"
                    2⤵
                      PID:1220
                    • C:\Windows\regedit.exe
                      "C:\Windows\regedit.exe"
                      2⤵
                      • Runs regedit.exe
                      PID:584
                    • C:\Windows\System32\taskmgr.exe
                      "C:\Windows\System32\taskmgr.exe"
                      2⤵
                        PID:268
                      • C:\Windows\System32\notepad.exe
                        "C:\Windows\System32\notepad.exe"
                        2⤵
                          PID:872
                        • C:\Windows\System32\cmd.exe
                          "C:\Windows\System32\cmd.exe"
                          2⤵
                            PID:280
                        • C:\Program Files\Internet Explorer\iexplore.exe
                          "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
                          1⤵
                          • Modifies Internet Explorer settings
                          • Suspicious use of FindShellTrayWindow
                          • Suspicious use of SetWindowsHookEx
                          • Suspicious use of WriteProcessMemory
                          PID:2352
                          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2352 CREDAT:275457 /prefetch:2
                            2⤵
                            • Modifies Internet Explorer settings
                            • Suspicious use of SetWindowsHookEx
                            PID:2760

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                          Filesize

                          344B

                          MD5

                          b06bc7178a59dc53ed1f6436da3011cb

                          SHA1

                          7dae3b774fc0162f8cb7387d11801ec45bb44fda

                          SHA256

                          468281515de3bb1b77f620c1f4a5f4151c2624b16e93c7f12750c6fbecb80103

                          SHA512

                          af14ddb449fd659341d91d6c1374c71ccb37ec7e3d12043dc40137b61d8ab8f272a2d40fee6b98de647df791a548cbb7e5953b0c142b888706c895729258cdd7

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                          Filesize

                          344B

                          MD5

                          0b9f97dd0a802304302aa8f2024376ab

                          SHA1

                          ceb8d9230b6c1ce7b7b1130237190b3aba2e2505

                          SHA256

                          f49754856c9b434ccb39c31b2523f1ce1ab8a330d5d5d535f09f7f691392f438

                          SHA512

                          38a30737e29169f8925774c3e401b8a32b103f6090aa23ab4b50f7263a2bc47abd309eb597fc23d23416ec2d0b30fbaab117a229b6f329770930fdd801ded5b7

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                          Filesize

                          344B

                          MD5

                          e9aad60a156dd9072e3c1787719975a8

                          SHA1

                          959cb0808a813ad98f56835ef7d962f541e5961e

                          SHA256

                          ec4ce6e4892dc5350a70a37943cb595ea1a940705d68f7104a7d44365fa47002

                          SHA512

                          9f6b292b1e0e2f9a7bcb39efb97914e1ee8711b659df54401cf33df7996f39005aaf57880a216f6837f65d29447e989d32e4553ffa8fde2bef07a07b2f7d81cd

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                          Filesize

                          344B

                          MD5

                          6c9a1a46f05990b0f7fc785ff535c0bb

                          SHA1

                          4603d1cf6cae786df297f873729554c675f2f8df

                          SHA256

                          5d25e542240743d0f9d05ad29e5ca2c9f03f95471a280c1b475ed2e5784d71ca

                          SHA512

                          1ef13efde5e8853e21d3ff7dc9d46b621654754e3e0527d2adf0a53d40b5f8d1e8304141c084548de22598a7845b38be838e4ada64530f8fab5829566f5ce3b7

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                          Filesize

                          344B

                          MD5

                          d9d8dd34508cc001a7fa3f14edea139d

                          SHA1

                          3508d210e0c10cb550a4a05212d035d3db777aa6

                          SHA256

                          d85f03b9cdd137009508d4437818edc34a19550cb9fce6f1cdf147787c2fab33

                          SHA512

                          30394cdc040f83f3230b2755d0e7c37bf9da388bd95e6913fa38ed8e0e69ff5eebf3029b4c0b8a02412dda5944ce82605fac6e3802e2d3eabfb8304af96b158b

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                          Filesize

                          344B

                          MD5

                          67c8f180c84048fcd6ec551e0d31c0cf

                          SHA1

                          3b3501d7216bbff0d14d4e1719f3bff69361639b

                          SHA256

                          cf940029c8226952f2523cf23c8fa674d210d2f1999b8cd2e7664e56e99ab0e7

                          SHA512

                          29e7db262852d1de99047a65593ff4d991cca268960dcdd87a82c14862e237d0145ba7b54be57e3fda8a625fb81f92969c545a8df5f4e38da4e3137139f06ed5

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                          Filesize

                          344B

                          MD5

                          c0a371804839a075b8d7af6ba80f037a

                          SHA1

                          463a8047f3188e0beef9be2828c57166a3aac54f

                          SHA256

                          861292474a0b3b59bb93bfb7f1c856bf16cacd5420d2463d9c4b3cae2b7398b4

                          SHA512

                          e74822fb083539f020598dae9474b7d9bebf7649eaf689c4b598baf8f6095c155cf9265d1a10df268fbad9dc3f7f35fa66b34840c24770b032a80c6f54984508

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                          Filesize

                          344B

                          MD5

                          16b97b6cf2878f9c4ead1d9c141bbf6a

                          SHA1

                          054ba74336a3823afca323e307d48f0d5f6e04fb

                          SHA256

                          738e4b2b30488634e33c5802cc932fff1a07c6c2b77afd3fcec2e8eb114c8852

                          SHA512

                          51255e92a8e7d8791df00ed892c7a439d31c34bd105a14b0ea866e41fa15a9a4f8717aeea71cccf5f6b5aaa028de1ae04adbffcd1f30d5e6610409eed19b0081

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                          Filesize

                          344B

                          MD5

                          8b5848d018bc34dd8e2b67704781430e

                          SHA1

                          a6d50125d1739ada50127f9da4d849d963775792

                          SHA256

                          4311c9e14f0d5c63c1c382522ce2e63eb7ed17dd60dc908f178afca468f7f54c

                          SHA512

                          793074d438b792caf2c4a806f5f764a9bdfddd9678aee5edbd4ffde4e03a82f5f7eeafc91123254da6892de833a7856ef7e3afb28ec64a5b4d5fa240af2914ea

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                          Filesize

                          344B

                          MD5

                          3b890a5b2aab6b48f843406951a67a6e

                          SHA1

                          0aa315075e8a037d918c1994a6f17dd3957f51bc

                          SHA256

                          8c50090d816ddf5c3ff0c16bd013253f83400560255a20a1e575098946aec31a

                          SHA512

                          01c8364be55ff553e4cf5b34e58e11b1ac6c44409365ddd69d1625c32c12c4377b11350724a05dd7c2b92afa6e4670c78eda687c88af8063d3136b490dd267b7

                        • C:\Users\Admin\AppData\Local\Temp\Cab5247.tmp

                          Filesize

                          65KB

                          MD5

                          ac05d27423a85adc1622c714f2cb6184

                          SHA1

                          b0fe2b1abddb97837ea0195be70ab2ff14d43198

                          SHA256

                          c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

                          SHA512

                          6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

                        • C:\Users\Admin\AppData\Local\Temp\Tar52A7.tmp

                          Filesize

                          171KB

                          MD5

                          9c0c641c06238516f27941aa1166d427

                          SHA1

                          64cd549fb8cf014fcd9312aa7a5b023847b6c977

                          SHA256

                          4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

                          SHA512

                          936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

                        • memory/2684-1-0x0000000140000000-0x00000001405E8000-memory.dmp

                          Filesize

                          5.9MB

                        • memory/2684-0-0x0000000140000000-0x00000001405E8000-memory.dmp

                          Filesize

                          5.9MB