Analysis

  • max time kernel
    96s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-07-2024 17:45

General

  • Target

    run.vbs

  • Size

    101B

  • MD5

    696b3a336c893d3a07bce9f038c09544

  • SHA1

    9682ede0f41d23a14d25bc8de7c75ea6742e25a9

  • SHA256

    5f000b43575e765ceb6e2ec9c8ebc0de6679da3315008f9c8bcb1c0578abe5e1

  • SHA512

    6ff84167b2fccf2725e52aef40f606cedfe2d90f2f02b52b0a2e24849708ce52889013d90234322ca21eebb41a78083c3cdc4ab340f44ca71e44f0a9ef6a2bb5

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\run.vbs"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2532
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c echo YOUR COMPUTER GOT HACKED && echo && echo bye && pause
      2⤵
        PID:2836

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads