Analysis
-
max time kernel
139s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
16/04/2024, 12:15
Static task
static1
Behavioral task
behavioral1
Sample
eassas.vbs
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
eassas.vbs
Resource
win10v2004-20240412-en
General
-
Target
eassas.vbs
-
Size
277B
-
MD5
d6e8991258ba8e031d1e494db7153d26
-
SHA1
b7ebe5ae4d9b88da1062ac7efcad8ad9a506d0b9
-
SHA256
a36616c8b585021a012b75b61a80e58011c43e27ff7ce598e4e324e30baa4501
-
SHA512
9f0d6e661387b99b0a88b782120047247ff1e77111a43db3273a863b704b065367cb6281d7f0a5d137259f90a267ecb28ba700c0ca63a2756531ff9e7a247c6c
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-355664440-2199602304-1223909400-1000\Control Panel\International\Geo\Nation WScript.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4356 mspaint.exe 4356 mspaint.exe 3148 mspaint.exe 3148 mspaint.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4356 mspaint.exe 4356 mspaint.exe 4356 mspaint.exe 4356 mspaint.exe 3148 mspaint.exe 3148 mspaint.exe 3148 mspaint.exe 3148 mspaint.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 608 wrote to memory of 4356 608 WScript.exe 86 PID 608 wrote to memory of 4356 608 WScript.exe 86 PID 608 wrote to memory of 3148 608 WScript.exe 96 PID 608 wrote to memory of 3148 608 WScript.exe 96
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\eassas.vbs"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:608 -
C:\Windows\System32\mspaint.exe"C:\Windows\System32\mspaint.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4356
-
-
C:\Windows\System32\mspaint.exe"C:\Windows\System32\mspaint.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3148
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService1⤵PID:4616
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5589fb10bb18a094954e4262f779db8eb
SHA17f0658a52ea26b4ac62cfb9f0405e21aa8589aa4
SHA2560f628fdd83b79ed8129ac8005873c2d1a9e94f9434825d373399aca52d0a4d0f
SHA512136358c7e54059ff854d4aba9df59635cfdf429f04080d232a8b93dfefcd7209eeb66fd4c33dece27ae9f38b3d71b54ef5d600fb6695d7565279b4236bf2e9a5