Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
22/07/2024, 21:56
Static task
static1
Behavioral task
behavioral1
Sample
target.vbs
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
target.vbs
Resource
win10v2004-20240709-en
General
-
Target
target.vbs
-
Size
1KB
-
MD5
047e87e8306b8b11daba4bc3035fc7fb
-
SHA1
42138360239225217ecd5ddd2ad40e1aaa404b94
-
SHA256
9302630fb4128bee2249a47be96fd735145e7b80cad7c4f624ebcc0867b0d021
-
SHA512
723df4222f407ede9d74eaa5e2ab1ab30632c4e7ba9927737316686b0da2a22410e07f7732b98cb5edc4af4e45ed5b0f4d20a0158d559a90095551f23e4e5922
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\Control Panel\International\Geo\Nation WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000_Classes\Local Settings WScript.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 564 msedge.exe 564 msedge.exe 4080 msedge.exe 4080 msedge.exe 1200 identity_helper.exe 1200 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3540 wrote to memory of 4976 3540 WScript.exe 86 PID 3540 wrote to memory of 4976 3540 WScript.exe 86 PID 3540 wrote to memory of 3688 3540 WScript.exe 88 PID 3540 wrote to memory of 3688 3540 WScript.exe 88 PID 3540 wrote to memory of 4080 3540 WScript.exe 89 PID 3540 wrote to memory of 4080 3540 WScript.exe 89 PID 4080 wrote to memory of 2320 4080 msedge.exe 90 PID 4080 wrote to memory of 2320 4080 msedge.exe 90 PID 4080 wrote to memory of 1844 4080 msedge.exe 91 PID 4080 wrote to memory of 1844 4080 msedge.exe 91 PID 4080 wrote to memory of 1844 4080 msedge.exe 91 PID 4080 wrote to memory of 1844 4080 msedge.exe 91 PID 4080 wrote to memory of 1844 4080 msedge.exe 91 PID 4080 wrote to memory of 1844 4080 msedge.exe 91 PID 4080 wrote to memory of 1844 4080 msedge.exe 91 PID 4080 wrote to memory of 1844 4080 msedge.exe 91 PID 4080 wrote to memory of 1844 4080 msedge.exe 91 PID 4080 wrote to memory of 1844 4080 msedge.exe 91 PID 4080 wrote to memory of 1844 4080 msedge.exe 91 PID 4080 wrote to memory of 1844 4080 msedge.exe 91 PID 4080 wrote to memory of 1844 4080 msedge.exe 91 PID 4080 wrote to memory of 1844 4080 msedge.exe 91 PID 4080 wrote to memory of 1844 4080 msedge.exe 91 PID 4080 wrote to memory of 1844 4080 msedge.exe 91 PID 4080 wrote to memory of 1844 4080 msedge.exe 91 PID 4080 wrote to memory of 1844 4080 msedge.exe 91 PID 4080 wrote to memory of 1844 4080 msedge.exe 91 PID 4080 wrote to memory of 1844 4080 msedge.exe 91 PID 4080 wrote to memory of 1844 4080 msedge.exe 91 PID 4080 wrote to memory of 1844 4080 msedge.exe 91 PID 4080 wrote to memory of 1844 4080 msedge.exe 91 PID 4080 wrote to memory of 1844 4080 msedge.exe 91 PID 4080 wrote to memory of 1844 4080 msedge.exe 91 PID 4080 wrote to memory of 1844 4080 msedge.exe 91 PID 4080 wrote to memory of 1844 4080 msedge.exe 91 PID 4080 wrote to memory of 1844 4080 msedge.exe 91 PID 4080 wrote to memory of 1844 4080 msedge.exe 91 PID 4080 wrote to memory of 1844 4080 msedge.exe 91 PID 4080 wrote to memory of 1844 4080 msedge.exe 91 PID 4080 wrote to memory of 1844 4080 msedge.exe 91 PID 4080 wrote to memory of 1844 4080 msedge.exe 91 PID 4080 wrote to memory of 1844 4080 msedge.exe 91 PID 4080 wrote to memory of 1844 4080 msedge.exe 91 PID 4080 wrote to memory of 1844 4080 msedge.exe 91 PID 4080 wrote to memory of 1844 4080 msedge.exe 91 PID 4080 wrote to memory of 1844 4080 msedge.exe 91 PID 4080 wrote to memory of 1844 4080 msedge.exe 91 PID 4080 wrote to memory of 1844 4080 msedge.exe 91 PID 4080 wrote to memory of 564 4080 msedge.exe 92 PID 4080 wrote to memory of 564 4080 msedge.exe 92 PID 4080 wrote to memory of 3280 4080 msedge.exe 93 PID 4080 wrote to memory of 3280 4080 msedge.exe 93 PID 4080 wrote to memory of 3280 4080 msedge.exe 93 PID 4080 wrote to memory of 3280 4080 msedge.exe 93 PID 4080 wrote to memory of 3280 4080 msedge.exe 93 PID 4080 wrote to memory of 3280 4080 msedge.exe 93 PID 4080 wrote to memory of 3280 4080 msedge.exe 93 PID 4080 wrote to memory of 3280 4080 msedge.exe 93 PID 4080 wrote to memory of 3280 4080 msedge.exe 93 PID 4080 wrote to memory of 3280 4080 msedge.exe 93 PID 4080 wrote to memory of 3280 4080 msedge.exe 93 PID 4080 wrote to memory of 3280 4080 msedge.exe 93 PID 4080 wrote to memory of 3280 4080 msedge.exe 93 PID 4080 wrote to memory of 3280 4080 msedge.exe 93
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\target.vbs"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Ñ]¬{[}ÄD¤„â‚(ÃÄ)msg.vbs"2⤵PID:4976
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\)¤(Ä]‚Ä‘{¬Ã[}ÄâDmsg.vbs"2⤵PID:3688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.google.com/search?q=welcome+to+brazil2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8ad4346f8,0x7ff8ad434708,0x7ff8ad4347183⤵PID:2320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,973862681744743136,13618912645389948193,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2192 /prefetch:23⤵PID:1844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,973862681744743136,13618912645389948193,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,973862681744743136,13618912645389948193,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2708 /prefetch:83⤵PID:3280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,973862681744743136,13618912645389948193,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:13⤵PID:4716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,973862681744743136,13618912645389948193,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:13⤵PID:2936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,973862681744743136,13618912645389948193,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4884 /prefetch:13⤵PID:3996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,973862681744743136,13618912645389948193,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5032 /prefetch:83⤵PID:3160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,973862681744743136,13618912645389948193,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5032 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:1200
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1584
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4240
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD560ead4145eb78b972baf6c6270ae6d72
SHA1e71f4507bea5b518d9ee9fb2d523c5a11adea842
SHA256b9e99e7387a915275e8fe4ac0b0c0cd330b4632814d5c9c446beb2755f1309a7
SHA5128cdbafd2783048f5f54f22e13f6ef890936d5b986b0bb3fa86d2420a5bfecf7bedc56f46e6d5f126eae79f492315843c134c441084b912296e269f384a73ccde
-
Filesize
152B
MD51f9d180c0bcf71b48e7bc8302f85c28f
SHA1ade94a8e51c446383dc0a45edf5aad5fa20edf3c
SHA256a17d56c41d524453a78e3f06e0d0b0081e79d090a4b75d0b693ddbc39f6f7fdc
SHA512282863df0e51288049587886ed37ad1cf5b6bfeed86454ea3b9f2bb7f0a1c591f3540c62712ebfcd6f1095e1977446dd5b13b904bb52b6d5c910a1efc208c785
-
Filesize
211KB
MD5151fb811968eaf8efb840908b89dc9d4
SHA17ec811009fd9b0e6d92d12d78b002275f2f1bee1
SHA256043fd8558e4a5a60aaccd2f0377f77a544e3e375242e9d7200dc6e51f94103ed
SHA51283aface0ab01da52fd077f747c9d5916e3c06b0ea5c551d7d316707ec3e8f3f986ce1c82e6f2136e48c6511a83cb0ac67ff6dc8f0e440ac72fc6854086a87674
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5f99c1461df55111f9a6ac2a2fe3b2d73
SHA1fc8e74b3be0adea6a921a3e6372f7e721b35bbdb
SHA256f3deed8bf59a75f5cb4a399816017614195ea589ff9d0a1adba03614d7201992
SHA512fad5a72b7b84550c8de58c4a92e0dff4b15fa82b37e03f263317eedf44c250b9320564cc1dcfce1bdd58a74c30c3cb1ce7556f842e3a7d0cde28021a0d4e24e3
-
Filesize
815B
MD5827f4a0d30231fc3cbe1e21d19755df3
SHA1933127b35e4a4d5680ce9e254f39d475e4577072
SHA2561c47a51bbdb4fad6719252c3447fb749a6fdcad752d44ca6b793ed24f722604e
SHA5121f1dc85ce98380884c651077a2125cfef6b5b63f83d884d413a00a093ca36774b2df21d72809c1e3391a8cea2367ae592ea82f62351869eb99ab595d1bb2599e
-
Filesize
5KB
MD5223d80ac072e0c2ac56597ded8c99ac8
SHA144384c087dbb5cd038010ceff479db2f85d3931e
SHA2564e2daf71e0d98d98df734462602ff88cc40a20ab453213170c2c1105e5e89103
SHA512e4ed7a0835f0f1d7561694ecec9a037b671d13e0ca7c0829810530dfa57124f8f49a1486178447a20aca7072cdf2808f92de43909a0823b7047752f63703c631
-
Filesize
6KB
MD5eb1ba708a3bad312c1e2537a95641f94
SHA151204a0d42c426e6fa621dd8a515c196e356d31c
SHA256fc9a9627465fa771297a9a74593aa6e48337c054febb8c65685ec6c3679f7ae3
SHA5122b3391c5bcb0cb8cc55674016d94df6f629c1a7b252e46c493e1766e6c504105f5d81f30ae787928b6a7b12e83064336db4367d0283f75293c8811ddecb8f79e
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD58b5257a9d37a5c0ca0a6e5bc6f7880c5
SHA1160cf09970e18c978e8347d3e00e0e8bf1b7355e
SHA256c10e074ba70c1adef4e20e7e6275b675307ab3cd604069555faceb2a2e2f2310
SHA5129ebafa0a28d500b346c147cd864963e1fad0979a8011c0a8bac5e08e017de08fde941f1859592cef4aa6d16675b89e033d3a3023dac8adce96e0f60234d37ff1
-
Filesize
56B
MD5ee27117d12f2ba062ec5b274fd07e72d
SHA1ffb13b23b16b7def0e5705945fdffa18615a1a08
SHA25641baec094a9f40ef4b34c0678e3ba15bac1e7b53bc7e82ccedc4fd7d0ff8971d
SHA512104087c9ca73a4ce7f3cc47efd63be88cd8bec75be51744270f6ba3ae61ffe492da458cb09170ed172309cf6ed593b47781577152162730f27e1dc0377839e96
-
Filesize
56B
MD53c8174a145d0f8fc61414df6f525b1c0
SHA16d6728a28f48f46436aca1196e44bfac3c670b09
SHA2564aa456549fea53ed553962fb4d9c36887068909e1364fb5b01f8b50c264721f5
SHA51247a38d33d87fb4a851087c82406d9e56f7376f68f64fcfa9f44d8cb55915d9a47cd876cd65679af6f4a588a6c0fc07b3dc484e76260d40ea0500d4e5a2537b47