Analysis
-
max time kernel
2s -
max time network
9s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
04/07/2024, 17:38
Static task
static1
Behavioral task
behavioral1
Sample
script.vbs
Resource
win7-20240221-en
Errors
General
-
Target
script.vbs
-
Size
894B
-
MD5
e4eb801891b1e2d31bbf92ab4dbdc129
-
SHA1
b02944319c438a6bcdd52e1052eb1c23d7008230
-
SHA256
15c7e5e81d3c9c27ac8ee54fe02dd9d9adadcdd13bd758a0d501ad60f531ef46
-
SHA512
2ef19f1758a9c32d64f7ae8fe9716e98913bd5748acc76fe76b87d1b6bd6ea4eb349086b74f256ced24867bef284500c69c0e98a73335ca15828148a3a348a6a
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" powershell.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\Control Panel\International\Geo\Nation cmd.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\death\msgbox.vbs WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3724 powershell.exe 3724 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3724 powershell.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 4964 wrote to memory of 3724 4964 WScript.exe 83 PID 4964 wrote to memory of 3724 4964 WScript.exe 83 PID 4964 wrote to memory of 3632 4964 WScript.exe 85 PID 4964 wrote to memory of 3632 4964 WScript.exe 85 PID 4964 wrote to memory of 2436 4964 WScript.exe 87 PID 4964 wrote to memory of 2436 4964 WScript.exe 87 PID 4964 wrote to memory of 2340 4964 WScript.exe 89 PID 4964 wrote to memory of 2340 4964 WScript.exe 89 PID 4964 wrote to memory of 3048 4964 WScript.exe 91 PID 4964 wrote to memory of 3048 4964 WScript.exe 91 PID 4964 wrote to memory of 3628 4964 WScript.exe 93 PID 4964 wrote to memory of 3628 4964 WScript.exe 93 PID 4964 wrote to memory of 3672 4964 WScript.exe 95 PID 4964 wrote to memory of 3672 4964 WScript.exe 95 PID 4964 wrote to memory of 3496 4964 WScript.exe 97 PID 4964 wrote to memory of 3496 4964 WScript.exe 97 PID 4964 wrote to memory of 4896 4964 WScript.exe 99 PID 4964 wrote to memory of 4896 4964 WScript.exe 99 PID 4964 wrote to memory of 1620 4964 WScript.exe 101 PID 4964 wrote to memory of 1620 4964 WScript.exe 101 PID 4964 wrote to memory of 4588 4964 WScript.exe 103 PID 4964 wrote to memory of 4588 4964 WScript.exe 103 PID 4964 wrote to memory of 1500 4964 WScript.exe 105 PID 4964 wrote to memory of 1500 4964 WScript.exe 105 PID 3632 wrote to memory of 868 3632 cmd.exe 107 PID 3632 wrote to memory of 868 3632 cmd.exe 107 PID 4964 wrote to memory of 2756 4964 WScript.exe 108 PID 4964 wrote to memory of 2756 4964 WScript.exe 108
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\script.vbs"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-ItemProperty -Path REGISTRY::HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System -Name EnableLUA -Value 02⤵
- UAC bypass
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3724
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start C:\Windows\death\msgbox.vbs2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\death\msgbox.vbs"3⤵PID:868
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start C:\Windows\death\msgbox.vbs2⤵PID:2436
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\death\msgbox.vbs"3⤵PID:4104
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start C:\Windows\death\msgbox.vbs2⤵
- Checks computer location settings
PID:2340 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\death\msgbox.vbs"3⤵PID:3592
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start C:\Windows\death\msgbox.vbs2⤵PID:3048
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\death\msgbox.vbs"3⤵PID:2412
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start C:\Windows\death\msgbox.vbs2⤵PID:3628
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\death\msgbox.vbs"3⤵PID:3448
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start C:\Windows\death\msgbox.vbs2⤵PID:3672
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\death\msgbox.vbs"3⤵PID:632
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start C:\Windows\death\msgbox.vbs2⤵PID:3496
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\death\msgbox.vbs"3⤵PID:3736
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start C:\Windows\death\msgbox.vbs2⤵PID:4896
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\death\msgbox.vbs"3⤵PID:4448
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start C:\Windows\death\msgbox.vbs2⤵PID:1620
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\death\msgbox.vbs"3⤵PID:404
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start C:\Windows\death\msgbox.vbs2⤵PID:4588
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\death\msgbox.vbs"3⤵PID:528
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start C:\Windows\death\msgbox.vbs2⤵PID:1500
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\death\msgbox.vbs"3⤵PID:4312
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start C:\Windows\death\msgbox.vbs2⤵PID:2756
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\death\msgbox.vbs"3⤵PID:396
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start C:\Windows\death\msgbox.vbs2⤵PID:4268
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\death\msgbox.vbs"3⤵PID:4456
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start C:\Windows\death\msgbox.vbs2⤵PID:2364
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\death\msgbox.vbs"3⤵PID:952
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start C:\Windows\death\msgbox.vbs2⤵PID:3052
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\death\msgbox.vbs"3⤵PID:1636
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start C:\Windows\death\msgbox.vbs2⤵PID:4516
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\death\msgbox.vbs"3⤵PID:3944
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c shutdown /r /t 02⤵PID:1008
-
C:\Windows\system32\shutdown.exeshutdown /r /t 03⤵PID:1432
-
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3940855 /state1:0x41c64e6d1⤵PID:3976
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
28B
MD5b6e919a1dc3cba72b24ea865f4bf9e71
SHA1d0301379a04c0a87c5637d5621fa68086fbb89d0
SHA256907a059c55000bae173089ac312476ee122d28fb053dd872ec4dc6fea8bef907
SHA512b17bdfc11ea71f2fc9d91cce7e72b321f40a06a969c771f025c96edcaed303513d3ee62aee20dd6891ed3198f254710ae40d0d3005f6ff51cd05612210626104