Analysis
-
max time kernel
144s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14/03/2024, 22:20
Static task
static1
Behavioral task
behavioral1
Sample
c9c2ddc71cc9b025ea69178c8ad71b45.vbs
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
c9c2ddc71cc9b025ea69178c8ad71b45.vbs
Resource
win10v2004-20240226-en
General
-
Target
c9c2ddc71cc9b025ea69178c8ad71b45.vbs
-
Size
4KB
-
MD5
c9c2ddc71cc9b025ea69178c8ad71b45
-
SHA1
4858881f56c13dc76bba6710968c78167eaedda9
-
SHA256
b9a9db62b43cfae12d92297da0b5f7e41ad3feabc4f23d07f46802754b96c1bf
-
SHA512
34b4b9fe172b11bc721e97bf3f8c32c16be3ba56f660b642450dc7689cd4ec0a9d483411f71bfe0d3b4ab9d5aa9cb4123fe9ce00438234ac8544fa49d17d977c
-
SSDEEP
96:+d+xbAutAbiPDUwmipzhp/wlFfKavSTDWHmRdSVyMO2za4/XW6x8c/fWOn/d:DbAutAbiPwApv/wTfKa+6HuQyOza4dfj
Malware Config
Signatures
-
Blocklisted process makes network request 6 IoCs
flow pid Process 42 788 WScript.exe 64 788 WScript.exe 69 788 WScript.exe 77 788 WScript.exe 81 788 WScript.exe 92 788 WScript.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation WScript.exe -
Drops autorun.inf file 1 TTPs 4 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification F:\AUTORUN.INF WScript.exe File created C:\AUTORUN.INF WScript.exe File opened for modification C:\AUTORUN.INF WScript.exe File created F:\AUTORUN.INF WScript.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\System32\SysINfo.rEg WScript.exe File opened for modification C:\Windows\System32\SysINfo.rEg WScript.exe File created C:\Windows\System32\prncfg.vbs WScript.exe File opened for modification C:\Windows\System32\prncfg.vbs WScript.exe File created C:\Windows\System32\sYSinFO.REG WScript.exe File opened for modification C:\Windows\System32\sYSinFO.REG WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe -
Modifies registry class 39 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\NavBar = 000000000000000000000000000000008b000000870000003153505305d5cdd59c2e1b10939708002b2cf9ae6b0000005a000000007b00360044003800420042003300440033002d0039004400380037002d0034004100390031002d0041004200350036002d003400460033003000430046004600450046004500390046007d005f0057006900640074006800000013000000cc0000000000000000000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 = 50003100000000005a58d27a100041646d696e003c0009000400efbe5a5899716e589ab22e0000009de1010000000100000000000000000000000000000057ec5500410064006d0069006e00000014000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0 = 4e003100000000006e5899b2100054656d7000003a0009000400efbe5a5899716e5899b22e000000bce10100000001000000000000000000000000000000d3380d01540065006d007000000014000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags explorer.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders explorer.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 19002f433a5c000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings WScript.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0 = 50003100000000005a58137b10004c6f63616c003c0009000400efbe5a5899716e589ab22e000000bbe10100000001000000000000000000000000000000daf3e4004c006f00630061006c00000014000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 78003100000000005a5899711100557365727300640009000400efbe874f77486e589ab22e000000c70500000000010000000000000000003a00000000004d79d10055007300650072007300000040007300680065006c006c00330032002e0064006c006c002c002d0032003100380031003300000014000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 = 56003100000000005a58997112004170704461746100400009000400efbe5a5899716e589ab22e000000a8e101000000010000000000000000000000000000001a54ab004100700070004400610074006100000016000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\NodeSlot = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe -
Runs .reg file with regedit 2 IoCs
pid Process 656 regedit.exe 2548 regedit.exe -
Runs net.exe
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3576 explorer.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeSystemtimePrivilege 3456 cmd.exe Token: SeSystemtimePrivilege 3456 cmd.exe Token: SeSystemtimePrivilege 2344 cmd.exe Token: SeSystemtimePrivilege 2344 cmd.exe Token: SeSystemtimePrivilege 1156 cmd.exe Token: SeSystemtimePrivilege 1156 cmd.exe Token: SeSystemtimePrivilege 4664 cmd.exe Token: SeSystemtimePrivilege 4664 cmd.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3576 explorer.exe 3576 explorer.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 4772 wrote to memory of 2832 4772 WScript.exe 95 PID 4772 wrote to memory of 2832 4772 WScript.exe 95 PID 2832 wrote to memory of 3256 2832 net.exe 97 PID 2832 wrote to memory of 3256 2832 net.exe 97 PID 4772 wrote to memory of 656 4772 WScript.exe 99 PID 4772 wrote to memory of 656 4772 WScript.exe 99 PID 4772 wrote to memory of 1824 4772 WScript.exe 100 PID 4772 wrote to memory of 1824 4772 WScript.exe 100 PID 4772 wrote to memory of 3456 4772 WScript.exe 106 PID 4772 wrote to memory of 3456 4772 WScript.exe 106 PID 4772 wrote to memory of 2344 4772 WScript.exe 108 PID 4772 wrote to memory of 2344 4772 WScript.exe 108 PID 4772 wrote to memory of 788 4772 WScript.exe 110 PID 4772 wrote to memory of 788 4772 WScript.exe 110 PID 788 wrote to memory of 4340 788 WScript.exe 111 PID 788 wrote to memory of 4340 788 WScript.exe 111 PID 788 wrote to memory of 2548 788 WScript.exe 113 PID 788 wrote to memory of 2548 788 WScript.exe 113 PID 4340 wrote to memory of 3752 4340 net.exe 114 PID 4340 wrote to memory of 3752 4340 net.exe 114 PID 788 wrote to memory of 1156 788 WScript.exe 115 PID 788 wrote to memory of 1156 788 WScript.exe 115 PID 788 wrote to memory of 4664 788 WScript.exe 118 PID 788 wrote to memory of 4664 788 WScript.exe 118
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\c9c2ddc71cc9b025ea69178c8ad71b45.vbs"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" stoP shaReDaCCess2⤵
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stoP shaReDaCCess3⤵PID:3256
-
-
-
C:\Windows\regedit.exe"C:\Windows\regedit.exe" /S SYsINfO.reg2⤵
- Runs .reg file with regedit
PID:656
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe" .\2⤵PID:1824
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C DAtE 12/7/20192⤵
- Suspicious use of AdjustPrivilegeToken
PID:3456
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c daTE 3/14/20242⤵
- Suspicious use of AdjustPrivilegeToken
PID:2344
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\System32\PRncfg.Vbs"2⤵
- Blocklisted process makes network request
- Checks computer location settings
- Drops autorun.inf file
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:788 -
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" STOp SHArEdAccESS3⤵
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 STOp SHArEdAccESS4⤵PID:3752
-
-
-
C:\Windows\regedit.exe"C:\Windows\regedit.exe" /s SySinFo.REG3⤵
- Runs .reg file with regedit
PID:2548
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C daTe 3/13/20243⤵
- Suspicious use of AdjustPrivilegeToken
PID:1156
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c dAte 3/14/20243⤵
- Suspicious use of AdjustPrivilegeToken
PID:4664
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3576
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3560
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4092 --field-trial-handle=2280,i,716736634476467098,11449718822158202904,262144 --variations-seed-version /prefetch:81⤵PID:4064
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
497B
MD5d7b42537031be35e4b6a345eb701c768
SHA1a9f62724fa4997a1558970bb76489d3e07187797
SHA256ec02cb81228d5459a9fcea4d5f3b7b63048b87a0f89ffdf53ea035a4104c5ce0
SHA5123b952f8ccbdfef1396a614180ffa437116e7d05343d7cf3bd42da0e6987c7a74094e707872c2f6e23423a4df35b92358995910d95636befa33c35770848d44c2
-
Filesize
4KB
MD56ae3bb38259f22f0675e0de0afc308a0
SHA1de4b5d8ed385e9a23aa0afd9cd035aa0d079d042
SHA25689ecd03347d6ce1e722dd6ce5c4420d0438509f5c445d769c1766d82832c66c4
SHA5129c8d9dc6cdbf08b28e0c9bfa804e8bc50d55834425ed7a6c6f7adcc9d66283dd07c425a4f0d7436edc9b69e11ef4475a3aa52ec9c68278cf7433c4c25949cc59