Analysis

  • max time kernel
    34s
  • max time network
    100s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/06/2024, 09:44

General

  • Target

    code.vbs

  • Size

    1KB

  • MD5

    c8db0910ef325367970ff1c2b5130701

  • SHA1

    2b0ca564f0103ad0b6bfb52d2c9a1a8965171fc3

  • SHA256

    0d0bafc8f1c3a563f60ad72972b9e2c01fd40286920a1be6dce381999d9db9a7

  • SHA512

    7777856eb1e83c6f1ef3f72e6e9707502aef013cca449ed6e831999ed6cafe31adf6f8e59012ed097867275dff49b619f81baf0dfd7365e5952b873db2642c1f

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Modifies system executable filetype association 2 TTPs 47 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 64 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\code.vbs"
    1⤵
    • Checks computer location settings
    • Drops startup file
    • Suspicious use of WriteProcessMemory
    PID:632
    • C:\Windows\system32\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\NOTEHERE.txt
      2⤵
      • Opens file in notepad (likely ransom note)
      PID:3700
    • C:\Windows\explorer.exe
      "C:\Windows\explorer.exe"
      2⤵
        PID:4012
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:2540
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\kill.bat"
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:4028
        • C:\Windows\system32\reg.exe
          reg delete HKCR /f
          2⤵
          • Modifies system executable filetype association
          • Modifies registry class
          PID:228

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\kill.bat

              Filesize

              20B

              MD5

              9c3ef676bdaa506989278258d04b9bce

              SHA1

              bd8db4701f777e0b78aa2173d4a1270baa6e543f

              SHA256

              b9cba898cb7c03476da4b0eab23ee0540cea35cdad2a4469adfacc6d0c5bbebd

              SHA512

              34eabd625b9d11b10c1b55e42312e5ea10cc4ae292df9bc4b87c8f5740c5fe019b826f335c4a7934540610be95169a00ad338cfcccda6b8f263ce47bdf5dc527

            • C:\Users\Admin\Desktop\NOTEHERE.txt

              Filesize

              44B

              MD5

              9e7cd7c706e24d89a098713bda2ff52b

              SHA1

              ae5129be07fa9677b3e4c061cd9b1f13bc845920

              SHA256

              b6f67920cfcefee9c4d113cc74e3d111a48fbe2f8643fbe42f67a16c077a3be8

              SHA512

              588a23bc60e8dc0cdc4e07ac4cd5c1932b079b548a8e2561a3ab778423234cb4ec310c5a3cd11742e78837d653d51effaad89ea473cd3bccfbc7384e43cd23ae

            • C:\Users\Admin\Desktop\desktop.enc

              Filesize

              51B

              MD5

              485e50795d7a48d060b4f5a17a467278

              SHA1

              c38adc10ce5699e212cffb4f719d9c489073ec1a

              SHA256

              a74f37ca88daf16d63ae8e06a15fc4b7433a2e388e418290c6dbdc121c7ba91c

              SHA512

              e6bc3ce356e77aac3872e5dc501db6ae255019e0a70f8bf6cb557983b3e5d2f37d1ced3facdf7839802f6f765cdb0b22c969139b5d4df22503053a7fe3f0ced3