Analysis
-
max time kernel
35s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26-05-2024 15:11
Static task
static1
Behavioral task
behavioral1
Sample
target.vbs
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
target.vbs
Resource
win10v2004-20240508-en
General
-
Target
target.vbs
-
Size
849B
-
MD5
e49e5df8d31589df96557d1a62ac04f9
-
SHA1
cb08fca6dd478a3fa3054f13b01c49cf8af91e10
-
SHA256
ecd853ed875e310b5bb7f11f282c787f48bc9957d29540315a4f7916d2482aa2
-
SHA512
1cbaa53d049e1241c6736dc101f85d548d7836c3cd4aa858461e600c52270d848f04db4145bc70bf5b1f86affd6038286f828d1fe509dcf55b6efaab118dddfb
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 1 IoCs
pid Process 2588 taskkill.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2956 notepad.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2500 chrome.exe 2500 chrome.exe -
Suspicious use of AdjustPrivilegeToken 54 IoCs
description pid Process Token: SeShutdownPrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2612 wrote to memory of 2956 2612 WScript.exe 28 PID 2612 wrote to memory of 2956 2612 WScript.exe 28 PID 2612 wrote to memory of 2956 2612 WScript.exe 28 PID 2612 wrote to memory of 2588 2612 WScript.exe 29 PID 2612 wrote to memory of 2588 2612 WScript.exe 29 PID 2612 wrote to memory of 2588 2612 WScript.exe 29 PID 2612 wrote to memory of 2500 2612 WScript.exe 31 PID 2612 wrote to memory of 2500 2612 WScript.exe 31 PID 2612 wrote to memory of 2500 2612 WScript.exe 31 PID 2500 wrote to memory of 2380 2500 chrome.exe 32 PID 2500 wrote to memory of 2380 2500 chrome.exe 32 PID 2500 wrote to memory of 2380 2500 chrome.exe 32 PID 2500 wrote to memory of 2824 2500 chrome.exe 34 PID 2500 wrote to memory of 2824 2500 chrome.exe 34 PID 2500 wrote to memory of 2824 2500 chrome.exe 34 PID 2500 wrote to memory of 2824 2500 chrome.exe 34 PID 2500 wrote to memory of 2824 2500 chrome.exe 34 PID 2500 wrote to memory of 2824 2500 chrome.exe 34 PID 2500 wrote to memory of 2824 2500 chrome.exe 34 PID 2500 wrote to memory of 2824 2500 chrome.exe 34 PID 2500 wrote to memory of 2824 2500 chrome.exe 34 PID 2500 wrote to memory of 2824 2500 chrome.exe 34 PID 2500 wrote to memory of 2824 2500 chrome.exe 34 PID 2500 wrote to memory of 2824 2500 chrome.exe 34 PID 2500 wrote to memory of 2824 2500 chrome.exe 34 PID 2500 wrote to memory of 2824 2500 chrome.exe 34 PID 2500 wrote to memory of 2824 2500 chrome.exe 34 PID 2500 wrote to memory of 2824 2500 chrome.exe 34 PID 2500 wrote to memory of 2824 2500 chrome.exe 34 PID 2500 wrote to memory of 2824 2500 chrome.exe 34 PID 2500 wrote to memory of 2824 2500 chrome.exe 34 PID 2500 wrote to memory of 2824 2500 chrome.exe 34 PID 2500 wrote to memory of 2824 2500 chrome.exe 34 PID 2500 wrote to memory of 2824 2500 chrome.exe 34 PID 2500 wrote to memory of 2824 2500 chrome.exe 34 PID 2500 wrote to memory of 2824 2500 chrome.exe 34 PID 2500 wrote to memory of 2824 2500 chrome.exe 34 PID 2500 wrote to memory of 2824 2500 chrome.exe 34 PID 2500 wrote to memory of 2824 2500 chrome.exe 34 PID 2500 wrote to memory of 2824 2500 chrome.exe 34 PID 2500 wrote to memory of 2824 2500 chrome.exe 34 PID 2500 wrote to memory of 2824 2500 chrome.exe 34 PID 2500 wrote to memory of 2824 2500 chrome.exe 34 PID 2500 wrote to memory of 2824 2500 chrome.exe 34 PID 2500 wrote to memory of 2824 2500 chrome.exe 34 PID 2500 wrote to memory of 2824 2500 chrome.exe 34 PID 2500 wrote to memory of 2824 2500 chrome.exe 34 PID 2500 wrote to memory of 2824 2500 chrome.exe 34 PID 2500 wrote to memory of 2824 2500 chrome.exe 34 PID 2500 wrote to memory of 2824 2500 chrome.exe 34 PID 2500 wrote to memory of 2824 2500 chrome.exe 34 PID 2500 wrote to memory of 2100 2500 chrome.exe 35 PID 2500 wrote to memory of 2100 2500 chrome.exe 35 PID 2500 wrote to memory of 2100 2500 chrome.exe 35 PID 2500 wrote to memory of 1652 2500 chrome.exe 36 PID 2500 wrote to memory of 1652 2500 chrome.exe 36 PID 2500 wrote to memory of 1652 2500 chrome.exe 36 PID 2500 wrote to memory of 1652 2500 chrome.exe 36 PID 2500 wrote to memory of 1652 2500 chrome.exe 36 PID 2500 wrote to memory of 1652 2500 chrome.exe 36 PID 2500 wrote to memory of 1652 2500 chrome.exe 36 PID 2500 wrote to memory of 1652 2500 chrome.exe 36 PID 2500 wrote to memory of 1652 2500 chrome.exe 36 PID 2500 wrote to memory of 1652 2500 chrome.exe 36
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\target.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\System32\notepad.exe"C:\Windows\System32\notepad.exe" C:\Users\Admin\AppData\Roaming\example.txt2⤵
- Opens file in notepad (likely ransom note)
PID:2956
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /f im notepad.exe2⤵
- Kills process with taskkill
PID:2588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" www.google.com/search?q=what+is+the+problem+for+Admin%3F2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef69e9758,0x7fef69e9768,0x7fef69e97783⤵PID:2380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1128 --field-trial-handle=1168,i,5347664545598024944,14670876796671727304,131072 /prefetch:23⤵PID:2824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1536 --field-trial-handle=1168,i,5347664545598024944,14670876796671727304,131072 /prefetch:83⤵PID:2100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1608 --field-trial-handle=1168,i,5347664545598024944,14670876796671727304,131072 /prefetch:83⤵PID:1652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2316 --field-trial-handle=1168,i,5347664545598024944,14670876796671727304,131072 /prefetch:13⤵PID:828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2324 --field-trial-handle=1168,i,5347664545598024944,14670876796671727304,131072 /prefetch:13⤵PID:1420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1500 --field-trial-handle=1168,i,5347664545598024944,14670876796671727304,131072 /prefetch:23⤵PID:1932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3108 --field-trial-handle=1168,i,5347664545598024944,14670876796671727304,131072 /prefetch:13⤵PID:2732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3760 --field-trial-handle=1168,i,5347664545598024944,14670876796671727304,131072 /prefetch:83⤵PID:616
-
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1472
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
1KB
MD526245cf54cde0b99dcd2de3b3e78af25
SHA1d44dd2add8fafd7a52c70a1a45087c7f23ce1b68
SHA256bffb3349dcb8f840c44f02a082b4b7bcd20e310094f0a1bd1cd2c9c2fbceea45
SHA512896f22015244427871f162c3f8f0f90040aed8844feea5d92bf28318b71ccb2984feb1ba1de3adb78937659536a0def77e3c726ad63ad503666f2d987d8c1632
-
Filesize
5KB
MD561c5b271999aa49b0c27eee085423c66
SHA1bad095187f710101d2850237991d4ffa2bf37c68
SHA256c5264ebcd1e07dcccfee8f7b2c6a3234496f6fdbc2c68a834dd6e3d1dc15ed2b
SHA51218466e159d7be8f38d503d383c2e055e7444570ea15460880e7aba095015a114b0564d85a5ca9630deaf9b82c5ff0b0da656160c92d0e3c0e9724d0d5ff58fe1
-
Filesize
5KB
MD5fdb6aa58fa9c7c8525eed32f3c50d474
SHA1b8f2e9ed0c2bcf081e4d93a4dc930537da0c0191
SHA256a6447d6638dbee32479909073483581e49e3fb5836a3e48c3b1b7b15ed2dc646
SHA512d734d73ff32f9d973aa63c282d653cf55b85d33e41b1f2de9558378d99dc26c32d8e245f04c08068cce9e6df3572c3fef62060066bbf93547826f78ce0cf6ee5
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
105B
MD57974a453105fb964df9cbdf56bd8f998
SHA1f99e67104498c6a19323cdb636f3edfee2f89119
SHA25603eae3a1fc877ce36665bcf5c4f6b2614059447b454132083e3ed1eb439e00f0
SHA512243e57c7f65de4f0ad505062bb80f06b2342d515b0f55bed8978f51367e517c42d60df5d85d83fa5f9ec17f076d2ea40fe4eefed7fadc2e72f88fad57c63d107