Analysis
-
max time kernel
614s -
max time network
618s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
09-08-2024 12:32
Static task
static1
Behavioral task
behavioral1
Sample
mal.vbs
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
mal.vbs
Resource
win10v2004-20240802-en
General
-
Target
mal.vbs
-
Size
23KB
-
MD5
c697283f6d4effbc73365f1e6ce56754
-
SHA1
35f538451885c8d0ab49431df3e6d78deadb4bbe
-
SHA256
c5eaf4973b45ebcb1e10afc0f49d5b84c4d4214103c4b77a0263a6510f2d9ac0
-
SHA512
c5699a35e1c1b9a28dcc96088e8ff07e625436d0a6bcb0a869f13dff998fb4fcef02f15d275c8f1064a4d2685cd349ff80f506d7db69bcd72049e209922fac79
-
SSDEEP
384:oAuL8pGgtbsDFC70X0kNMthfiFQS/Lo/GY0XkUoJbG3gYgd1YQ+gNIINVS0AgAxw:LuL8pbsZCiMthqFQOLo/GY0L4p2O5d4Q
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Detected Nirsoft tools 3 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral1/memory/2936-118-0x0000000000400000-0x0000000000A7A000-memory.dmp Nirsoft behavioral1/memory/2936-119-0x0000000000400000-0x0000000000A7A000-memory.dmp Nirsoft behavioral1/memory/2936-117-0x0000000000400000-0x0000000000A7A000-memory.dmp Nirsoft -
NirSoft MailPassView 3 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral1/memory/2936-118-0x0000000000400000-0x0000000000A7A000-memory.dmp MailPassView behavioral1/memory/2936-119-0x0000000000400000-0x0000000000A7A000-memory.dmp MailPassView behavioral1/memory/2936-117-0x0000000000400000-0x0000000000A7A000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 3 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral1/memory/2936-118-0x0000000000400000-0x0000000000A7A000-memory.dmp WebBrowserPassView behavioral1/memory/2936-119-0x0000000000400000-0x0000000000A7A000-memory.dmp WebBrowserPassView behavioral1/memory/2936-117-0x0000000000400000-0x0000000000A7A000-memory.dmp WebBrowserPassView -
Blocklisted process makes network request 3 IoCs
flow pid Process 4 2388 WScript.exe 7 2388 WScript.exe 9 2388 WScript.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7fb.lnk attrib.exe -
Executes dropped EXE 1 IoCs
pid Process 1168 j0286yhmbf7ai.exe -
Loads dropped DLL 1 IoCs
pid Process 2936 attrib.exe -
Accesses Microsoft Outlook accounts 1 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts attrib.exe Key opened \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts attrib.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 1168 set thread context of 2936 1168 j0286yhmbf7ai.exe 32 PID 2936 set thread context of 2100 2936 attrib.exe 33 PID 2936 set thread context of 2552 2936 attrib.exe 34 PID 2100 set thread context of 2180 2100 attrib.exe 35 PID 2100 set thread context of 2336 2100 attrib.exe 36 PID 2552 set thread context of 860 2552 attrib.exe 37 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language j0286yhmbf7ai.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 WScript.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 WScript.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 860 attrib.exe 860 attrib.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2936 attrib.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 2388 WScript.exe 2388 WScript.exe 2388 WScript.exe 1168 j0286yhmbf7ai.exe 1168 j0286yhmbf7ai.exe 1168 j0286yhmbf7ai.exe 1168 j0286yhmbf7ai.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 1168 j0286yhmbf7ai.exe 1168 j0286yhmbf7ai.exe 1168 j0286yhmbf7ai.exe 1168 j0286yhmbf7ai.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2388 wrote to memory of 1168 2388 WScript.exe 31 PID 2388 wrote to memory of 1168 2388 WScript.exe 31 PID 2388 wrote to memory of 1168 2388 WScript.exe 31 PID 2388 wrote to memory of 1168 2388 WScript.exe 31 PID 1168 wrote to memory of 2936 1168 j0286yhmbf7ai.exe 32 PID 1168 wrote to memory of 2936 1168 j0286yhmbf7ai.exe 32 PID 1168 wrote to memory of 2936 1168 j0286yhmbf7ai.exe 32 PID 1168 wrote to memory of 2936 1168 j0286yhmbf7ai.exe 32 PID 1168 wrote to memory of 2936 1168 j0286yhmbf7ai.exe 32 PID 1168 wrote to memory of 2936 1168 j0286yhmbf7ai.exe 32 PID 1168 wrote to memory of 2936 1168 j0286yhmbf7ai.exe 32 PID 1168 wrote to memory of 2936 1168 j0286yhmbf7ai.exe 32 PID 1168 wrote to memory of 2936 1168 j0286yhmbf7ai.exe 32 PID 1168 wrote to memory of 2936 1168 j0286yhmbf7ai.exe 32 PID 1168 wrote to memory of 2936 1168 j0286yhmbf7ai.exe 32 PID 1168 wrote to memory of 2936 1168 j0286yhmbf7ai.exe 32 PID 1168 wrote to memory of 2936 1168 j0286yhmbf7ai.exe 32 PID 1168 wrote to memory of 2936 1168 j0286yhmbf7ai.exe 32 PID 2936 wrote to memory of 2100 2936 attrib.exe 33 PID 2936 wrote to memory of 2100 2936 attrib.exe 33 PID 2936 wrote to memory of 2100 2936 attrib.exe 33 PID 2936 wrote to memory of 2100 2936 attrib.exe 33 PID 2936 wrote to memory of 2100 2936 attrib.exe 33 PID 2936 wrote to memory of 2100 2936 attrib.exe 33 PID 2936 wrote to memory of 2100 2936 attrib.exe 33 PID 2936 wrote to memory of 2100 2936 attrib.exe 33 PID 2936 wrote to memory of 2100 2936 attrib.exe 33 PID 2936 wrote to memory of 2100 2936 attrib.exe 33 PID 2936 wrote to memory of 2100 2936 attrib.exe 33 PID 2936 wrote to memory of 2100 2936 attrib.exe 33 PID 2936 wrote to memory of 2100 2936 attrib.exe 33 PID 2936 wrote to memory of 2100 2936 attrib.exe 33 PID 2936 wrote to memory of 2552 2936 attrib.exe 34 PID 2936 wrote to memory of 2552 2936 attrib.exe 34 PID 2936 wrote to memory of 2552 2936 attrib.exe 34 PID 2936 wrote to memory of 2552 2936 attrib.exe 34 PID 2936 wrote to memory of 2552 2936 attrib.exe 34 PID 2936 wrote to memory of 2552 2936 attrib.exe 34 PID 2936 wrote to memory of 2552 2936 attrib.exe 34 PID 2936 wrote to memory of 2552 2936 attrib.exe 34 PID 2936 wrote to memory of 2552 2936 attrib.exe 34 PID 2936 wrote to memory of 2552 2936 attrib.exe 34 PID 2936 wrote to memory of 2552 2936 attrib.exe 34 PID 2936 wrote to memory of 2552 2936 attrib.exe 34 PID 2936 wrote to memory of 2552 2936 attrib.exe 34 PID 2936 wrote to memory of 2552 2936 attrib.exe 34 PID 2100 wrote to memory of 2180 2100 attrib.exe 35 PID 2100 wrote to memory of 2180 2100 attrib.exe 35 PID 2100 wrote to memory of 2180 2100 attrib.exe 35 PID 2100 wrote to memory of 2180 2100 attrib.exe 35 PID 2100 wrote to memory of 2180 2100 attrib.exe 35 PID 2100 wrote to memory of 2180 2100 attrib.exe 35 PID 2100 wrote to memory of 2336 2100 attrib.exe 36 PID 2100 wrote to memory of 2336 2100 attrib.exe 36 PID 2100 wrote to memory of 2336 2100 attrib.exe 36 PID 2100 wrote to memory of 2336 2100 attrib.exe 36 PID 2100 wrote to memory of 2336 2100 attrib.exe 36 PID 2100 wrote to memory of 2336 2100 attrib.exe 36 PID 2552 wrote to memory of 860 2552 attrib.exe 37 PID 2552 wrote to memory of 860 2552 attrib.exe 37 PID 2552 wrote to memory of 860 2552 attrib.exe 37 PID 2552 wrote to memory of 860 2552 attrib.exe 37 PID 2552 wrote to memory of 860 2552 attrib.exe 37 PID 2552 wrote to memory of 860 2552 attrib.exe 37 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Views/modifies file attributes 1 TTPs 6 IoCs
pid Process 860 attrib.exe 2936 attrib.exe 2100 attrib.exe 2552 attrib.exe 2180 attrib.exe 2336 attrib.exe
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\mal.vbs"1⤵
- Blocklisted process makes network request
- Modifies system certificate store
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\nn6qi26\j0286yhmbf7ai.exe"C:\nn6qi26\j0286yhmbf7ai.exe" j0286yhmbf72⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1168 -
\??\c:\windows\SysWOW64\attrib.exe"c:/windows/SysWOW64/attrib.exe"3⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
- Views/modifies file attributes
PID:2936 -
\??\c:\windows\SysWOW64\attrib.exec:\windows\SysWOW64\attrib.exe j0286yhmbf7 ##14⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
- Views/modifies file attributes
PID:2100 -
\??\c:\windows\SysWOW64\attrib.exe"c:\windows\SysWOW64\attrib.exe" /stext "WWy1"5⤵
- Accesses Microsoft Outlook accounts
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2180
-
-
\??\c:\windows\SysWOW64\attrib.exe"c:\windows\SysWOW64\attrib.exe" /stext "WWy1"5⤵
- Accesses Microsoft Outlook accounts
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2336
-
-
-
\??\c:\windows\SysWOW64\attrib.exec:\windows\SysWOW64\attrib.exe j0286yhmbf7 ##34⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
- Views/modifies file attributes
PID:2552 -
\??\c:\windows\SysWOW64\attrib.exe"c:\windows\SysWOW64\attrib.exe" /stext "WWy0"5⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Views/modifies file attributes
PID:860
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
142B
MD59a2e9394c545807936b1fb93820d11b6
SHA1ee54eb3a02b1bc6a692acedc257c7dab0ed9b80e
SHA256669b8c66b782dcf3ed93cffbb82ff67b4c16442693bef598f59c135e70e62ca0
SHA5124082f0b8120836a4055bb7b11cd17bc95b7b4256a0ed185dd06a3ff056a2614d002fc3de212ff3eee58fbdfeaac53d422424f46bbc1001476d3a75f0a39e47ff
-
Filesize
277KB
MD5efca48f79b8b46a4b36b3e4a4a9473b2
SHA160d7955cb8d72e836f00229e40ad117791c44797
SHA2563fbfbd042455269a51fbf8b9d067b8b7f0a939fd7fcc7d16bff4282e898691fe
SHA512ca90b7d8dc53cc90e1d75a53802bdbc3bdc7709e59997f3714dc4a73ab10cbbc6e1d8f47427c7a08a285bb273358d4c26bd69a1567151499c2369ca24dc05052
-
Filesize
475KB
MD5431ea22dfc9161171857a4b4b0d654cb
SHA134122f53d97032a44a33794dd6473b1afee0e4ba
SHA2569ecc9ae104e55639818b5fbc7b20c2360fdb38c590e976f9ee249375d8e08208
SHA51239e21d684f2c90ccd569cb6b3dc2f105b58f213c06fdae6ed9d730902b91c4dd9df618864451901780af23a17f5e34328477a3cb74f2c8363e00497358a38e95
-
Filesize
4.5MB
MD5fcf95a673fc6f66144fda45cf4178878
SHA17045244c1614b33ce9268ff204b29f335995e574
SHA2561d2d800a6f1cf902a5b62fc93ca26dd9e73e654c76a65e35a034e6c9e12fbc79
SHA512ed28d2428b5401b3a14ddb206f257e7678a6ced31cef034963b718b5dcd68699b1e55a535f5d73653df205e3527786e7823e90496384f1b9307edb7dfe7936ef
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
6.4MB
MD5f1bdba8ededc7120f738b69aeacab588
SHA1ab925af5329bfd4fed9ad7e4fbf882e7eae0c9df
SHA25677a7a093f93dd177213ca0cda1d8b88b3aecc24317a68a798bcb843462ac5a4a
SHA512e37702f0b535e595d43e9ef790f2b75e9755544b47f87ddecaa98cba6cae5daab70880de4c4a164c8b9ee90fb25e8900975591d96562c82acf32dd36d32b9a71
-
Filesize
925KB
MD50adb9b817f1df7807576c2d7068dd931
SHA14a1b94a9a5113106f40cd8ea724703734d15f118
SHA25698e4f904f7de1644e519d09371b8afcbbf40ff3bd56d76ce4df48479a4ab884b
SHA512883aa88f2dba4214bb534fbdaf69712127357a3d0f5666667525db3c1fa351598f067068dfc9e7c7a45fed4248d7dca729ba4f75764341e47048429f9ca8846a
-
Filesize
277KB
MD5cf0dbc1c057c44e0f053db964e83507f
SHA18a6b1f26ed64406c3628ba547508cc88a517a202
SHA2562eafe832a8d61339b1d552adea62cc54fcfbef6e62dda5e29c131c70aaacc379
SHA51275431f5674866c5a735a9f68ab5210cd0ab7ce8d10bd9aed53dfc7de8e8d4def5c9489226573c2a27b3c932589f17f3b8c703bc9f4693d50a27b8203e7bc0a7f