Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    16-05-2024 11:29

General

  • Target

    script.vbs

  • Size

    343B

  • MD5

    2da4964f79093dddcb47e53afe6bf978

  • SHA1

    c59f72e8cfd14447fbccee207e875441af4b2dbb

  • SHA256

    fe5e62776d4916b0b632584c0310aa13ac7cb7c869387546818b96f5ef5c3046

  • SHA512

    688ce93ea9b61d55ebe4729ec8a4f08b0ae8a1b5dd6f9e194dd8dee8087ffbd33bc2ae9dd6d1a5952f9fac7f121310385d2843b90afaeb1575d4a013e769d0f0

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\script.vbs"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:956
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"
      2⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:2084
  • C:\Program Files\VideoLAN\VLC\vlc.exe
    "C:\Program Files\VideoLAN\VLC\vlc.exe"
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:2592

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

    Filesize

    20KB

    MD5

    15f698f1d814e2e3260bc2d67c532b26

    SHA1

    4e3e20f688c7b799136c122f49a0ad55dc555bcf

    SHA256

    90ee30d9c1a5ef01021ddd1da1cddaa1ed6921501fee6b4ae54fe39187568fc0

    SHA512

    37386d2740aad69c0f366446a85ae7584d909646b16bf9b6df1024d965775d4a5fac60549256c5178ad9b617f9103ec8f9a6548361de8153b7cd31bcf39540aa

  • memory/2084-0-0x000000002F7C1000-0x000000002F7C2000-memory.dmp

    Filesize

    4KB

  • memory/2084-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2084-2-0x0000000070A8D000-0x0000000070A98000-memory.dmp

    Filesize

    44KB

  • memory/2084-32-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2084-33-0x0000000070A8D000-0x0000000070A98000-memory.dmp

    Filesize

    44KB

  • memory/2592-17-0x000007FEF6450000-0x000007FEF6484000-memory.dmp

    Filesize

    208KB

  • memory/2592-16-0x000000013FE40000-0x000000013FF38000-memory.dmp

    Filesize

    992KB

  • memory/2592-18-0x000007FEF5810000-0x000007FEF5AC6000-memory.dmp

    Filesize

    2.7MB

  • memory/2592-19-0x000007FEF4630000-0x000007FEF56E0000-memory.dmp

    Filesize

    16.7MB