Resubmissions

04/09/2024, 14:41

240904-r2xnbstdjb 7

10/04/2024, 10:27

240410-mhk3zacd83 7

Analysis

  • max time kernel
    124s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    04/09/2024, 14:41

General

  • Target

    3cbe7d544ef4c8ff8e5c1e101dbdf5316d0cfbe32658d8b9209f922309162bcf.vbs

  • Size

    6KB

  • MD5

    e3eb6e9bc8321adb844e30606ed275a4

  • SHA1

    a8730f75bc6bf86e39b26cbf7ec9ab71883012f9

  • SHA256

    3cbe7d544ef4c8ff8e5c1e101dbdf5316d0cfbe32658d8b9209f922309162bcf

  • SHA512

    0025ccbd19bdc213c438aaa41b0160e6f83d345394ab06c090ef37d512d63fca8732aaba51fd0e5c00aeed2865806426b788ef50ce88ffb429381abe29bd9fa3

  • SSDEEP

    96:elifguAgKNtexhBCCutCviwSHlmhhFOR3az0sAMWlP:88E4q2M3aWlP

Score
4/10

Malware Config

Signatures

  • Drops file in Program Files directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 64 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 21 IoCs
  • Suspicious use of WriteProcessMemory 47 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\3cbe7d544ef4c8ff8e5c1e101dbdf5316d0cfbe32658d8b9209f922309162bcf.vbs"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2532
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c dir /b C:\Windows\Microsoft.Net\Framework\v4.* >1.txt
      2⤵
        PID:2704
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c where /r C:\Windows\Microsoft.NET\Framework\ csc.exe > 1.txt
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2716
        • C:\Windows\system32\where.exe
          where /r C:\Windows\Microsoft.NET\Framework\ csc.exe
          3⤵
            PID:2840
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /out:C:\Users\Public\content\content.exe /target:winexe /resource:C:\Users\Public\content\content.bin C:\Users\Public\content\content.cs
          2⤵
          • System Location Discovery: System Language Discovery
          PID:2884
        • C:\Windows\System32\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /CREATE /sc minute /mo 5 /tn "S-1-5-21-1846800975-3917212583-2893086201-1000S-1-5-21-1846800975-3917212583-2893086201-1000" /tr "C:\Users\Public\content\content.exe" /F
          2⤵
          • Scheduled Task/Job: Scheduled Task
          PID:2000
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /c SCHTASKS /Query /FO LIST /V /tn S-1-5-21-1846800975-3917212583-2893086201-1000S-1-5-21-1846800975-3917212583-2893086201-1000 > 2.txt
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:2948
          • C:\Windows\system32\schtasks.exe
            SCHTASKS /Query /FO LIST /V /tn S-1-5-21-1846800975-3917212583-2893086201-1000S-1-5-21-1846800975-3917212583-2893086201-1000
            3⤵
              PID:2132
        • C:\Windows\explorer.exe
          "C:\Windows\explorer.exe"
          1⤵
            PID:2420
          • C:\Windows\System32\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\3cbe7d544ef4c8ff8e5c1e101dbdf5316d0cfbe32658d8b9209f922309162bcf.vbs"
            1⤵
            • Suspicious use of WriteProcessMemory
            PID:1720
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /c dir /b C:\Windows\Microsoft.Net\Framework\v4.* >1.txt
              2⤵
                PID:1952
              • C:\Windows\System32\cmd.exe
                "C:\Windows\System32\cmd.exe" /c where /r C:\Windows\Microsoft.NET\Framework\ csc.exe > 1.txt
                2⤵
                • Suspicious use of WriteProcessMemory
                PID:1572
                • C:\Windows\system32\where.exe
                  where /r C:\Windows\Microsoft.NET\Framework\ csc.exe
                  3⤵
                    PID:264
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /out:C:\Users\Public\content\content.exe /target:winexe /resource:C:\Users\Public\content\content.bin C:\Users\Public\content\content.cs
                  2⤵
                  • System Location Discovery: System Language Discovery
                  PID:3036
                • C:\Windows\System32\schtasks.exe
                  "C:\Windows\System32\schtasks.exe" /CREATE /sc minute /mo 5 /tn "S-1-5-21-1846800975-3917212583-2893086201-1000S-1-5-21-1846800975-3917212583-2893086201-1000" /tr "C:\Users\Public\content\content.exe" /F
                  2⤵
                  • Scheduled Task/Job: Scheduled Task
                  PID:1084
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe" /c SCHTASKS /Query /FO LIST /V /tn S-1-5-21-1846800975-3917212583-2893086201-1000S-1-5-21-1846800975-3917212583-2893086201-1000 > 2.txt
                  2⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1600
                  • C:\Windows\system32\schtasks.exe
                    SCHTASKS /Query /FO LIST /V /tn S-1-5-21-1846800975-3917212583-2893086201-1000S-1-5-21-1846800975-3917212583-2893086201-1000
                    3⤵
                      PID:296
                • C:\Windows\system32\rundll32.exe
                  "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\3cbe7d544ef4c8ff8e5c1e101dbdf5316d0cfbe32658d8b9209f922309162bcf.vbs
                  1⤵
                  • Drops file in Program Files directory
                  • Modifies registry class
                  • Suspicious behavior: GetForegroundWindowSpam
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:2400
                  • C:\Program Files\Windows NT\Accessories\WORDPAD.EXE
                    "C:\Program Files\Windows NT\Accessories\WORDPAD.EXE" "C:\Users\Admin\AppData\Local\Temp\3cbe7d544ef4c8ff8e5c1e101dbdf5316d0cfbe32658d8b9209f922309162bcf.vbs"
                    2⤵
                    • Suspicious use of SetWindowsHookEx
                    PID:1520

                Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Temp\1.txt

                        Filesize

                        12B

                        MD5

                        1553a24788772d819bf65e65d640a83a

                        SHA1

                        78833dd13f8f6abea09c340585bd16e311f9f053

                        SHA256

                        e20bd636aa3b121a5e1961de234bcd3e26a022b8d976f6b4b6d3c1f908df54a1

                        SHA512

                        b5b1e8ee4fa1349f75a310eeea2d6b8888093060ef07223ee0a0b9fef63f69adaa8553cb2e26ec37a188a7350f930d6a273107f7c6a75593502fde2203d73a52

                      • C:\Users\Admin\AppData\Local\Temp\1.txt

                        Filesize

                        159B

                        MD5

                        2b21fa1eb8b60826214409656af634a6

                        SHA1

                        9ba74502483b020a8d8d6ee012844b5ab607a4a6

                        SHA256

                        31db3ceb02898746e946f215cfba712f28deacb12569eb9da67871231574f0b7

                        SHA512

                        2eca18acbecab8f9822afbc16215d299e34c23e3686db759fe87e354cf1aa7935ab7318958a378f05c9e677e8fb218a7439c8f0dfecee8ad924e942902d702e1

                      • C:\Users\Admin\AppData\Local\Temp\2.txt

                        Filesize

                        1KB

                        MD5

                        8e1179f68288345810303d5206057b0a

                        SHA1

                        00aa66faeeb32362dd171444a71a81223a154c4e

                        SHA256

                        5e2b27f90e9a873733a471ba945a046519798ae6600b83deed21dac23ef149f1

                        SHA512

                        5fd7718c54845126df7151c375b1a36f0c6438ed31185d39d1575a7261e10e6b530870b652014f12a617918455305780c080b177a0e056bd099364730ac48a83

                      • C:\Users\Admin\AppData\Local\Temp\2.txt

                        Filesize

                        1KB

                        MD5

                        df99e9815c790ff3627d62383827d822

                        SHA1

                        519380664f2977508adeb98fd4c53711df905601

                        SHA256

                        a3e22856b1006afde3d2be394ca5b1d8d7e131fca23dd15148c98ad81153ee00

                        SHA512

                        559ab811104afc500d3cf39096ed537c7524d2c15e1d8885a3d621a1b6b1690912e371cd5c86bc14b71b01cc4f0f6f28fa9f0986478e1af86f3f94709a67e1fa

                      • memory/2400-10-0x0000000004010000-0x0000000004020000-memory.dmp

                        Filesize

                        64KB