Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/07/2024, 21:56

General

  • Target

    target.vbs

  • Size

    1KB

  • MD5

    047e87e8306b8b11daba4bc3035fc7fb

  • SHA1

    42138360239225217ecd5ddd2ad40e1aaa404b94

  • SHA256

    9302630fb4128bee2249a47be96fd735145e7b80cad7c4f624ebcc0867b0d021

  • SHA512

    723df4222f407ede9d74eaa5e2ab1ab30632c4e7ba9927737316686b0da2a22410e07f7732b98cb5edc4af4e45ed5b0f4d20a0158d559a90095551f23e4e5922

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\target.vbs"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3540
    • C:\Windows\System32\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Ñ]¬{[}ÄD¤„â‚(ÃĐ)msg.vbs"
      2⤵
        PID:4976
      • C:\Windows\System32\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\)¤(Ä]‚Ä‘{¬Ã[}ÄâDmsg.vbs"
        2⤵
          PID:3688
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.google.com/search?q=welcome+to+brazil
          2⤵
          • Enumerates system info in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of WriteProcessMemory
          PID:4080
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8ad4346f8,0x7ff8ad434708,0x7ff8ad434718
            3⤵
              PID:2320
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,973862681744743136,13618912645389948193,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2192 /prefetch:2
              3⤵
                PID:1844
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,973862681744743136,13618912645389948193,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:3
                3⤵
                • Suspicious behavior: EnumeratesProcesses
                PID:564
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,973862681744743136,13618912645389948193,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2708 /prefetch:8
                3⤵
                  PID:3280
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,973862681744743136,13618912645389948193,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:1
                  3⤵
                    PID:4716
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,973862681744743136,13618912645389948193,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:1
                    3⤵
                      PID:2936
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,973862681744743136,13618912645389948193,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4884 /prefetch:1
                      3⤵
                        PID:3996
                      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,973862681744743136,13618912645389948193,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5032 /prefetch:8
                        3⤵
                          PID:3160
                        • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,973862681744743136,13618912645389948193,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5032 /prefetch:8
                          3⤵
                          • Suspicious behavior: EnumeratesProcesses
                          PID:1200
                    • C:\Windows\System32\CompPkgSrv.exe
                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                      1⤵
                        PID:1584
                      • C:\Windows\System32\CompPkgSrv.exe
                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                        1⤵
                          PID:4240

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                          Filesize

                          152B

                          MD5

                          60ead4145eb78b972baf6c6270ae6d72

                          SHA1

                          e71f4507bea5b518d9ee9fb2d523c5a11adea842

                          SHA256

                          b9e99e7387a915275e8fe4ac0b0c0cd330b4632814d5c9c446beb2755f1309a7

                          SHA512

                          8cdbafd2783048f5f54f22e13f6ef890936d5b986b0bb3fa86d2420a5bfecf7bedc56f46e6d5f126eae79f492315843c134c441084b912296e269f384a73ccde

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                          Filesize

                          152B

                          MD5

                          1f9d180c0bcf71b48e7bc8302f85c28f

                          SHA1

                          ade94a8e51c446383dc0a45edf5aad5fa20edf3c

                          SHA256

                          a17d56c41d524453a78e3f06e0d0b0081e79d090a4b75d0b693ddbc39f6f7fdc

                          SHA512

                          282863df0e51288049587886ed37ad1cf5b6bfeed86454ea3b9f2bb7f0a1c591f3540c62712ebfcd6f1095e1977446dd5b13b904bb52b6d5c910a1efc208c785

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000001

                          Filesize

                          211KB

                          MD5

                          151fb811968eaf8efb840908b89dc9d4

                          SHA1

                          7ec811009fd9b0e6d92d12d78b002275f2f1bee1

                          SHA256

                          043fd8558e4a5a60aaccd2f0377f77a544e3e375242e9d7200dc6e51f94103ed

                          SHA512

                          83aface0ab01da52fd077f747c9d5916e3c06b0ea5c551d7d316707ec3e8f3f986ce1c82e6f2136e48c6511a83cb0ac67ff6dc8f0e440ac72fc6854086a87674

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                          Filesize

                          120B

                          MD5

                          f99c1461df55111f9a6ac2a2fe3b2d73

                          SHA1

                          fc8e74b3be0adea6a921a3e6372f7e721b35bbdb

                          SHA256

                          f3deed8bf59a75f5cb4a399816017614195ea589ff9d0a1adba03614d7201992

                          SHA512

                          fad5a72b7b84550c8de58c4a92e0dff4b15fa82b37e03f263317eedf44c250b9320564cc1dcfce1bdd58a74c30c3cb1ce7556f842e3a7d0cde28021a0d4e24e3

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                          Filesize

                          815B

                          MD5

                          827f4a0d30231fc3cbe1e21d19755df3

                          SHA1

                          933127b35e4a4d5680ce9e254f39d475e4577072

                          SHA256

                          1c47a51bbdb4fad6719252c3447fb749a6fdcad752d44ca6b793ed24f722604e

                          SHA512

                          1f1dc85ce98380884c651077a2125cfef6b5b63f83d884d413a00a093ca36774b2df21d72809c1e3391a8cea2367ae592ea82f62351869eb99ab595d1bb2599e

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                          Filesize

                          5KB

                          MD5

                          223d80ac072e0c2ac56597ded8c99ac8

                          SHA1

                          44384c087dbb5cd038010ceff479db2f85d3931e

                          SHA256

                          4e2daf71e0d98d98df734462602ff88cc40a20ab453213170c2c1105e5e89103

                          SHA512

                          e4ed7a0835f0f1d7561694ecec9a037b671d13e0ca7c0829810530dfa57124f8f49a1486178447a20aca7072cdf2808f92de43909a0823b7047752f63703c631

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                          Filesize

                          6KB

                          MD5

                          eb1ba708a3bad312c1e2537a95641f94

                          SHA1

                          51204a0d42c426e6fa621dd8a515c196e356d31c

                          SHA256

                          fc9a9627465fa771297a9a74593aa6e48337c054febb8c65685ec6c3679f7ae3

                          SHA512

                          2b3391c5bcb0cb8cc55674016d94df6f629c1a7b252e46c493e1766e6c504105f5d81f30ae787928b6a7b12e83064336db4367d0283f75293c8811ddecb8f79e

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                          Filesize

                          16B

                          MD5

                          46295cac801e5d4857d09837238a6394

                          SHA1

                          44e0fa1b517dbf802b18faf0785eeea6ac51594b

                          SHA256

                          0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                          SHA512

                          8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                          Filesize

                          16B

                          MD5

                          206702161f94c5cd39fadd03f4014d98

                          SHA1

                          bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                          SHA256

                          1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                          SHA512

                          0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                          Filesize

                          11KB

                          MD5

                          8b5257a9d37a5c0ca0a6e5bc6f7880c5

                          SHA1

                          160cf09970e18c978e8347d3e00e0e8bf1b7355e

                          SHA256

                          c10e074ba70c1adef4e20e7e6275b675307ab3cd604069555faceb2a2e2f2310

                          SHA512

                          9ebafa0a28d500b346c147cd864963e1fad0979a8011c0a8bac5e08e017de08fde941f1859592cef4aa6d16675b89e033d3a3023dac8adce96e0f60234d37ff1

                        • C:\Users\Admin\AppData\Roaming\)¤(Ä]‚Ä‘{¬Ã[}ÄâDmsg.vbs

                          Filesize

                          56B

                          MD5

                          ee27117d12f2ba062ec5b274fd07e72d

                          SHA1

                          ffb13b23b16b7def0e5705945fdffa18615a1a08

                          SHA256

                          41baec094a9f40ef4b34c0678e3ba15bac1e7b53bc7e82ccedc4fd7d0ff8971d

                          SHA512

                          104087c9ca73a4ce7f3cc47efd63be88cd8bec75be51744270f6ba3ae61ffe492da458cb09170ed172309cf6ed593b47781577152162730f27e1dc0377839e96

                        • C:\Users\Admin\AppData\Roaming\Ñ]¬{[}ÄD¤„â‚(ÃĐ)msg.vbs

                          Filesize

                          56B

                          MD5

                          3c8174a145d0f8fc61414df6f525b1c0

                          SHA1

                          6d6728a28f48f46436aca1196e44bfac3c670b09

                          SHA256

                          4aa456549fea53ed553962fb4d9c36887068909e1364fb5b01f8b50c264721f5

                          SHA512

                          47a38d33d87fb4a851087c82406d9e56f7376f68f64fcfa9f44d8cb55915d9a47cd876cd65679af6f4a588a6c0fc07b3dc484e76260d40ea0500d4e5a2537b47