Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
19/04/2024, 07:34
Static task
static1
Behavioral task
behavioral1
Sample
script.vbs
Resource
win7-20240221-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
script.vbs
Resource
win10v2004-20240412-en
3 signatures
150 seconds
General
-
Target
script.vbs
-
Size
1KB
-
MD5
ec7131b07794a886075e945fc6b5544b
-
SHA1
9ae771d29aabefb6b5a8f0e84ffef7c69e4a7731
-
SHA256
6f94552d7c928ee2b335585479314ff8e9ff78eb4f2cfa46e988e44abeb71551
-
SHA512
3f0e8875001f838d40c7d2dfc290a662600646a4333e404b8cb85d65ef80ff8457e199c8961426edda416a6ce98cad5e766091b003058326cf6c948960cbfe75
Score
7/10
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\Control Panel\International\Geo\Nation WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4720 wrote to memory of 740 4720 WScript.exe 86 PID 4720 wrote to memory of 740 4720 WScript.exe 86 PID 740 wrote to memory of 1916 740 cmd.exe 88 PID 740 wrote to memory of 1916 740 cmd.exe 88
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\script.vbs"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c rundll32.exe user32.dll, SystemParametersInfo, 17, 0, 22⤵
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Windows\system32\rundll32.exerundll32.exe user32.dll, SystemParametersInfo, 17, 0, 23⤵PID:1916
-
-