Analysis

  • max time kernel
    416s
  • max time network
    414s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-06-2024 05:08

General

  • Target

    jihqoarjwq (10).vbs

  • Size

    723KB

  • MD5

    d05f80069be8a82ce39f984e75c1f179

  • SHA1

    95d06cfa9de0b6e9c0dc8318d573edac2f23bfb2

  • SHA256

    91ddcb5e1fa831cfcf287b03ee1f2b73a6e42544b529aa79715e89ef79752c14

  • SHA512

    d8ed8ab6b004fd74b0760feb96502e39f2cb9ae0bb60b98d7335727773c28ce5ae86f022069f80f217ca61828419ec483a518b9541ff9aec12c4fc6655b4657b

  • SSDEEP

    384:x35xQ35xcY5xM/35xv35xCs5xI35xk535x535xc3mxCp35xT35xm35xDEUc/DG9u:1XRKEDrC

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\jihqoarjwq (10).vbs"
    1⤵
    • Checks computer location settings
    • Drops startup file
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:532
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\jihqoarjwq (10).vbs"
      2⤵
      • Drops startup file
      • Adds Run key to start application
      PID:4516

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\jihqoarjwq (10).vbs

    Filesize

    723KB

    MD5

    3949d78d973f183bba1494d6f769d1ea

    SHA1

    dc68a4ad027d80cbfb6c3f7c63be52db172b0302

    SHA256

    da1ff3c715d2b5eeb1fc04c66f841e540a5a395c9401135e24fb640ed9817590

    SHA512

    eee58aa4d76f80a4f11b2791aa0e8c187120b7f9c5b793d81489286eb4408e44f6a0427a710db34c98a9aa546bc83bb3c2d0dcd421a4eab224c2d4159da48083

  • C:\Users\Admin\AppData\Roaming\jihqoarjwq (10).vbs

    Filesize

    723KB

    MD5

    d05f80069be8a82ce39f984e75c1f179

    SHA1

    95d06cfa9de0b6e9c0dc8318d573edac2f23bfb2

    SHA256

    91ddcb5e1fa831cfcf287b03ee1f2b73a6e42544b529aa79715e89ef79752c14

    SHA512

    d8ed8ab6b004fd74b0760feb96502e39f2cb9ae0bb60b98d7335727773c28ce5ae86f022069f80f217ca61828419ec483a518b9541ff9aec12c4fc6655b4657b