Analysis

  • max time kernel
    119s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    30-06-2024 13:16

General

  • Target

    script.vbs

  • Size

    954B

  • MD5

    ba8126ebff4ef9d65a0c1a4a2cd472ae

  • SHA1

    df5853cfa0dee40c97066fb26a1d3fe998db0d17

  • SHA256

    3281e12696162f5fad62ef950cf21c709a364ebc272de6b7e1aeb5a5c365380e

  • SHA512

    b07440e7f3584fff2430cc9b56d75859810b4e9546a6d3047822a1cef1b6ee8ab8a9fa917b2300c95fb0ab65a2b24998577be5b8a3ea9114b36ab631dc2a5aed

Score
8/10

Malware Config

Signatures

  • Disables Task Manager via registry modification
  • Drops file in Drivers directory 64 IoCs
  • Manipulates Digital Signatures 1 IoCs

    Attackers can apply techniques such as modifying certain DLL exports to make their binary seem valid.

  • Boot or Logon Autostart Execution: Print Processors 1 TTPs 1 IoCs

    Adversaries may abuse print processors to run malicious DLLs during system boot for persistence and/or privilege escalation.

  • Drops file in System32 directory 64 IoCs
  • Modifies termsrv.dll 1 TTPs 1 IoCs

    Commonly used to allow simultaneous RDP sessions.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\script.vbs"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2124
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c rd/s/q C:\Windows\System32
      2⤵
      • Drops file in Drivers directory
      • Manipulates Digital Signatures
      • Boot or Logon Autostart Execution: Print Processors
      • Drops file in System32 directory
      • Modifies termsrv.dll
      PID:2888
    • C:\Windows\System32\reg.exe
      "C:\Windows\System32\reg.exe" add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f
      2⤵
      • Modifies registry key
      PID:2804

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads