Analysis
-
max time kernel
416s -
max time network
414s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24-06-2024 05:08
Static task
static1
Behavioral task
behavioral1
Sample
jihqoarjwq (10).vbs
Resource
win10v2004-20240508-en
General
-
Target
jihqoarjwq (10).vbs
-
Size
723KB
-
MD5
d05f80069be8a82ce39f984e75c1f179
-
SHA1
95d06cfa9de0b6e9c0dc8318d573edac2f23bfb2
-
SHA256
91ddcb5e1fa831cfcf287b03ee1f2b73a6e42544b529aa79715e89ef79752c14
-
SHA512
d8ed8ab6b004fd74b0760feb96502e39f2cb9ae0bb60b98d7335727773c28ce5ae86f022069f80f217ca61828419ec483a518b9541ff9aec12c4fc6655b4657b
-
SSDEEP
384:x35xQ35xcY5xM/35xv35xCs5xI35xk535x535xc3mxCp35xT35xm35xDEUc/DG9u:1XRKEDrC
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation WScript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\jihqoarjwq (10).vbs WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\jihqoarjwq (10).vbs wscript.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jihqoarjwq (10) = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\jihqoarjwq (10).vbs\"" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jihqoarjwq (10) = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\jihqoarjwq (10).vbs\"" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jihqoarjwq (10) = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\jihqoarjwq (10).vbs\"" WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jihqoarjwq (10) = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\jihqoarjwq (10).vbs\"" WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 532 wrote to memory of 4516 532 WScript.exe 81 PID 532 wrote to memory of 4516 532 WScript.exe 81
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\jihqoarjwq (10).vbs"1⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\jihqoarjwq (10).vbs"2⤵
- Drops startup file
- Adds Run key to start application
PID:4516
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
723KB
MD53949d78d973f183bba1494d6f769d1ea
SHA1dc68a4ad027d80cbfb6c3f7c63be52db172b0302
SHA256da1ff3c715d2b5eeb1fc04c66f841e540a5a395c9401135e24fb640ed9817590
SHA512eee58aa4d76f80a4f11b2791aa0e8c187120b7f9c5b793d81489286eb4408e44f6a0427a710db34c98a9aa546bc83bb3c2d0dcd421a4eab224c2d4159da48083
-
Filesize
723KB
MD5d05f80069be8a82ce39f984e75c1f179
SHA195d06cfa9de0b6e9c0dc8318d573edac2f23bfb2
SHA25691ddcb5e1fa831cfcf287b03ee1f2b73a6e42544b529aa79715e89ef79752c14
SHA512d8ed8ab6b004fd74b0760feb96502e39f2cb9ae0bb60b98d7335727773c28ce5ae86f022069f80f217ca61828419ec483a518b9541ff9aec12c4fc6655b4657b