Analysis

  • max time kernel
    144s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/03/2024, 22:20

General

  • Target

    c9c2ddc71cc9b025ea69178c8ad71b45.vbs

  • Size

    4KB

  • MD5

    c9c2ddc71cc9b025ea69178c8ad71b45

  • SHA1

    4858881f56c13dc76bba6710968c78167eaedda9

  • SHA256

    b9a9db62b43cfae12d92297da0b5f7e41ad3feabc4f23d07f46802754b96c1bf

  • SHA512

    34b4b9fe172b11bc721e97bf3f8c32c16be3ba56f660b642450dc7689cd4ec0a9d483411f71bfe0d3b4ab9d5aa9cb4123fe9ce00438234ac8544fa49d17d977c

  • SSDEEP

    96:+d+xbAutAbiPDUwmipzhp/wlFfKavSTDWHmRdSVyMO2za4/XW6x8c/fWOn/d:DbAutAbiPwApv/wTfKa+6HuQyOza4dfj

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 6 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops autorun.inf file 1 TTPs 4 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 39 IoCs
  • Runs .reg file with regedit 2 IoCs
  • Runs net.exe
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\c9c2ddc71cc9b025ea69178c8ad71b45.vbs"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4772
    • C:\Windows\System32\net.exe
      "C:\Windows\System32\net.exe" stoP shaReDaCCess
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2832
      • C:\Windows\system32\net1.exe
        C:\Windows\system32\net1 stoP shaReDaCCess
        3⤵
          PID:3256
      • C:\Windows\regedit.exe
        "C:\Windows\regedit.exe" /S SYsINfO.reg
        2⤵
        • Runs .reg file with regedit
        PID:656
      • C:\Windows\explorer.exe
        "C:\Windows\explorer.exe" .\
        2⤵
          PID:1824
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /C DAtE 12/7/2019
          2⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:3456
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /c daTE 3/14/2024
          2⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2344
        • C:\Windows\System32\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Windows\System32\PRncfg.Vbs"
          2⤵
          • Blocklisted process makes network request
          • Checks computer location settings
          • Drops autorun.inf file
          • Drops file in System32 directory
          • Suspicious use of WriteProcessMemory
          PID:788
          • C:\Windows\System32\net.exe
            "C:\Windows\System32\net.exe" STOp SHArEdAccESS
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:4340
            • C:\Windows\system32\net1.exe
              C:\Windows\system32\net1 STOp SHArEdAccESS
              4⤵
                PID:3752
            • C:\Windows\regedit.exe
              "C:\Windows\regedit.exe" /s SySinFo.REG
              3⤵
              • Runs .reg file with regedit
              PID:2548
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /C daTe 3/13/2024
              3⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:1156
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /c dAte 3/14/2024
              3⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:4664
        • C:\Windows\explorer.exe
          C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
          1⤵
          • Modifies Internet Explorer settings
          • Modifies registry class
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious use of SetWindowsHookEx
          PID:3576
        • C:\Windows\System32\rundll32.exe
          C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
          1⤵
            PID:3560
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4092 --field-trial-handle=2280,i,716736634476467098,11449718822158202904,262144 --variations-seed-version /prefetch:8
            1⤵
              PID:4064

            Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Windows\SYSTEM32\SySinFo.REG

                    Filesize

                    497B

                    MD5

                    d7b42537031be35e4b6a345eb701c768

                    SHA1

                    a9f62724fa4997a1558970bb76489d3e07187797

                    SHA256

                    ec02cb81228d5459a9fcea4d5f3b7b63048b87a0f89ffdf53ea035a4104c5ce0

                    SHA512

                    3b952f8ccbdfef1396a614180ffa437116e7d05343d7cf3bd42da0e6987c7a74094e707872c2f6e23423a4df35b92358995910d95636befa33c35770848d44c2

                  • C:\Windows\System32\PRncfg.Vbs

                    Filesize

                    4KB

                    MD5

                    6ae3bb38259f22f0675e0de0afc308a0

                    SHA1

                    de4b5d8ed385e9a23aa0afd9cd035aa0d079d042

                    SHA256

                    89ecd03347d6ce1e722dd6ce5c4420d0438509f5c445d769c1766d82832c66c4

                    SHA512

                    9c8d9dc6cdbf08b28e0c9bfa804e8bc50d55834425ed7a6c6f7adcc9d66283dd07c425a4f0d7436edc9b69e11ef4475a3aa52ec9c68278cf7433c4c25949cc59