Analysis
-
max time kernel
131s -
max time network
27s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
15-04-2024 23:47
Static task
static1
Behavioral task
behavioral1
Sample
vbs.vbs
Resource
win7-20231129-en
windows7-x64
6 signatures
300 seconds
General
-
Target
vbs.vbs
-
Size
1KB
-
MD5
239bbcf5668cd4778530d27aa4a50d3a
-
SHA1
694809c0a1c739bc85d9790460153caff768b71f
-
SHA256
dd37c75a0da7c3be6f4dc3594cf7bd3460200593664a5344eb0c9120ef61d86f
-
SHA512
08f1f2437286743964142fafe6db8c62e02e2cfbdeb5b9842a1f555bc00cb615b8fc98dc355067045a20afbbc3d60b09c61018ead2407105cce2e9c877440057
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
pid Process 2880 taskkill.exe -
Modifies registry key 1 TTPs 2 IoCs
pid Process 3028 reg.exe 2644 reg.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2880 taskkill.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1392 wrote to memory of 2036 1392 WScript.exe 28 PID 1392 wrote to memory of 2036 1392 WScript.exe 28 PID 1392 wrote to memory of 2036 1392 WScript.exe 28 PID 1392 wrote to memory of 2156 1392 WScript.exe 30 PID 1392 wrote to memory of 2156 1392 WScript.exe 30 PID 1392 wrote to memory of 2156 1392 WScript.exe 30 PID 1392 wrote to memory of 1228 1392 WScript.exe 32 PID 1392 wrote to memory of 1228 1392 WScript.exe 32 PID 1392 wrote to memory of 1228 1392 WScript.exe 32 PID 2036 wrote to memory of 3028 2036 cmd.exe 33 PID 2036 wrote to memory of 3028 2036 cmd.exe 33 PID 2036 wrote to memory of 3028 2036 cmd.exe 33 PID 1228 wrote to memory of 2512 1228 wscript.exe 34 PID 1228 wrote to memory of 2512 1228 wscript.exe 34 PID 1228 wrote to memory of 2512 1228 wscript.exe 34 PID 1228 wrote to memory of 2616 1228 wscript.exe 36 PID 1228 wrote to memory of 2616 1228 wscript.exe 36 PID 1228 wrote to memory of 2616 1228 wscript.exe 36 PID 2512 wrote to memory of 2644 2512 cmd.exe 38 PID 2512 wrote to memory of 2644 2512 cmd.exe 38 PID 2512 wrote to memory of 2644 2512 cmd.exe 38 PID 1228 wrote to memory of 2880 1228 wscript.exe 39 PID 1228 wrote to memory of 2880 1228 wscript.exe 39 PID 1228 wrote to memory of 2880 1228 wscript.exe 39
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\vbs.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f2⤵
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- UAC bypass
- Modifies registry key
PID:3028
-
-
-
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" DELETE "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate" /v ABC_DEF /f2⤵PID:2156
-
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" "C:\Users\Admin\AppData\Local\Temp\vbs.vbs" uac2⤵
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- UAC bypass
- Modifies registry key
PID:2644
-
-
-
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" DELETE "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate" /v ABC_DEF /f3⤵PID:2616
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /im svchost.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2880
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs1⤵PID:2608
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs1⤵PID:2656
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs1⤵PID:2764
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted1⤵PID:2776
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs1⤵PID:2856
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs1⤵PID:752