Analysis

  • max time kernel
    143s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-05-2024 11:29

General

  • Target

    script.vbs

  • Size

    343B

  • MD5

    2da4964f79093dddcb47e53afe6bf978

  • SHA1

    c59f72e8cfd14447fbccee207e875441af4b2dbb

  • SHA256

    fe5e62776d4916b0b632584c0310aa13ac7cb7c869387546818b96f5ef5c3046

  • SHA512

    688ce93ea9b61d55ebe4729ec8a4f08b0ae8a1b5dd6f9e194dd8dee8087ffbd33bc2ae9dd6d1a5952f9fac7f121310385d2843b90afaeb1575d4a013e769d0f0

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 3 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\script.vbs"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1072
    • C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE"
      2⤵
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:3672
  • C:\Program Files\VideoLAN\VLC\vlc.exe
    "C:\Program Files\VideoLAN\VLC\vlc.exe"
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:1084

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\TCDA817.tmp\sist02.xsl

    Filesize

    245KB

    MD5

    f883b260a8d67082ea895c14bf56dd56

    SHA1

    7954565c1f243d46ad3b1e2f1baf3281451fc14b

    SHA256

    ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353

    SHA512

    d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e

  • memory/1084-37-0x00007FFD03330000-0x00007FFD035E6000-memory.dmp

    Filesize

    2.7MB

  • memory/1084-557-0x00007FFCFBEF0000-0x00007FFCFCFA0000-memory.dmp

    Filesize

    16.7MB

  • memory/1084-44-0x00007FFCFBEF0000-0x00007FFCFCFA0000-memory.dmp

    Filesize

    16.7MB

  • memory/1084-45-0x00007FFD00830000-0x00007FFD00897000-memory.dmp

    Filesize

    412KB

  • memory/1084-38-0x00007FFD16900000-0x00007FFD16918000-memory.dmp

    Filesize

    96KB

  • memory/1084-35-0x00007FF7A4DC0000-0x00007FF7A4EB8000-memory.dmp

    Filesize

    992KB

  • memory/1084-40-0x00007FFD15BB0000-0x00007FFD15BC1000-memory.dmp

    Filesize

    68KB

  • memory/1084-41-0x00007FFD15B90000-0x00007FFD15BA7000-memory.dmp

    Filesize

    92KB

  • memory/1084-42-0x00007FFD154E0000-0x00007FFD154FD000-memory.dmp

    Filesize

    116KB

  • memory/1084-43-0x00007FFD0FF50000-0x00007FFD0FF61000-memory.dmp

    Filesize

    68KB

  • memory/1084-39-0x00007FFD15E60000-0x00007FFD15E77000-memory.dmp

    Filesize

    92KB

  • memory/1084-36-0x00007FFD16700000-0x00007FFD16734000-memory.dmp

    Filesize

    208KB

  • memory/3672-2-0x00007FFCE4C10000-0x00007FFCE4C20000-memory.dmp

    Filesize

    64KB

  • memory/3672-0-0x00007FFCE4C10000-0x00007FFCE4C20000-memory.dmp

    Filesize

    64KB

  • memory/3672-16-0x00007FFD24B90000-0x00007FFD24D85000-memory.dmp

    Filesize

    2.0MB

  • memory/3672-15-0x00007FFD24B90000-0x00007FFD24D85000-memory.dmp

    Filesize

    2.0MB

  • memory/3672-17-0x00007FFD24B90000-0x00007FFD24D85000-memory.dmp

    Filesize

    2.0MB

  • memory/3672-19-0x00007FFD24B90000-0x00007FFD24D85000-memory.dmp

    Filesize

    2.0MB

  • memory/3672-18-0x00007FFD24B90000-0x00007FFD24D85000-memory.dmp

    Filesize

    2.0MB

  • memory/3672-13-0x00007FFD24B90000-0x00007FFD24D85000-memory.dmp

    Filesize

    2.0MB

  • memory/3672-12-0x00007FFD24B90000-0x00007FFD24D85000-memory.dmp

    Filesize

    2.0MB

  • memory/3672-11-0x00007FFCE2890000-0x00007FFCE28A0000-memory.dmp

    Filesize

    64KB

  • memory/3672-10-0x00007FFD24B90000-0x00007FFD24D85000-memory.dmp

    Filesize

    2.0MB

  • memory/3672-14-0x00007FFCE2890000-0x00007FFCE28A0000-memory.dmp

    Filesize

    64KB

  • memory/3672-5-0x00007FFCE4C10000-0x00007FFCE4C20000-memory.dmp

    Filesize

    64KB

  • memory/3672-7-0x00007FFD24B90000-0x00007FFD24D85000-memory.dmp

    Filesize

    2.0MB

  • memory/3672-8-0x00007FFCE4C10000-0x00007FFCE4C20000-memory.dmp

    Filesize

    64KB

  • memory/3672-9-0x00007FFD24B90000-0x00007FFD24D85000-memory.dmp

    Filesize

    2.0MB

  • memory/3672-6-0x00007FFD24B90000-0x00007FFD24D85000-memory.dmp

    Filesize

    2.0MB

  • memory/3672-4-0x00007FFD24B90000-0x00007FFD24D85000-memory.dmp

    Filesize

    2.0MB

  • memory/3672-3-0x00007FFCE4C10000-0x00007FFCE4C20000-memory.dmp

    Filesize

    64KB

  • memory/3672-534-0x00007FFD24B90000-0x00007FFD24D85000-memory.dmp

    Filesize

    2.0MB

  • memory/3672-535-0x00007FFD24C2D000-0x00007FFD24C2E000-memory.dmp

    Filesize

    4KB

  • memory/3672-536-0x00007FFD24B90000-0x00007FFD24D85000-memory.dmp

    Filesize

    2.0MB

  • memory/3672-1-0x00007FFD24C2D000-0x00007FFD24C2E000-memory.dmp

    Filesize

    4KB

  • memory/3672-635-0x00007FFD24B90000-0x00007FFD24D85000-memory.dmp

    Filesize

    2.0MB