Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 05:48
Static task
static1
Behavioral task
behavioral1
Sample
E-Post Label.vbs
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
E-Post Label.vbs
Resource
win10v2004-20240802-en
General
-
Target
E-Post Label.vbs
-
Size
249KB
-
MD5
26a2367b6a0035d899ff71de3322c0a6
-
SHA1
887b82684544efe2441603763a1f8a34ddee4358
-
SHA256
0a2e4facb3402296c3d0734d3515a6f428819f6dfb4d9a06fc8d6d75fc3953d2
-
SHA512
3985000c57cd0ff1d65bb7a1d94d8505df69b4c376556fc74bd5a4fcd083f323de4bf03c15844fd30283ae7ec564fcce973a618eb7f893a3ef67ea68a22a3df8
-
SSDEEP
768:s109A1DgI0MTlpSqJpDET4ETR+GJosPJ+yE0voKETTjiPLhcUkrNoc:3MqPJ+L+DOCPLFkBr
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\jqmeByDaBmaZbYEfjXBKawKPD.vbs\"" WScript.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\jqmeByDaBmaZbYEfjXBKawKPD = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\jqmeByDaBmaZbYEfjXBKawKPD.vbs\"" WScript.exe -
Blocklisted process makes network request 4 IoCs
flow pid Process 4 2788 WScript.exe 5 2788 WScript.exe 6 2788 WScript.exe 7 2788 WScript.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\jqmeByDaBmaZbYEfjXBKawKPD = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\jqmeByDaBmaZbYEfjXBKawKPD.vbs\"" WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jqmeByDaBmaZbYEfjXBKawKPD = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\jqmeByDaBmaZbYEfjXBKawKPD.vbs\"" WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2728 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1984 wrote to memory of 2788 1984 WScript.exe 31 PID 1984 wrote to memory of 2788 1984 WScript.exe 31 PID 1984 wrote to memory of 2788 1984 WScript.exe 31 PID 2788 wrote to memory of 2728 2788 WScript.exe 32 PID 2788 wrote to memory of 2728 2788 WScript.exe 32 PID 2788 wrote to memory of 2728 2788 WScript.exe 32 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\E-Post Label.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\jqmeByDaBmaZbYEfjXBKawKPD.vbs"2⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Blocklisted process makes network request
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc ONLOGON /tn ChromeUpdate /tr "C:\Users\Admin\AppData\Roaming\jqmeByDaBmaZbYEfjXBKawKPD.vbs" /F3⤵
- Scheduled Task/Job: Scheduled Task
PID:2728
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
249KB
MD526a2367b6a0035d899ff71de3322c0a6
SHA1887b82684544efe2441603763a1f8a34ddee4358
SHA2560a2e4facb3402296c3d0734d3515a6f428819f6dfb4d9a06fc8d6d75fc3953d2
SHA5123985000c57cd0ff1d65bb7a1d94d8505df69b4c376556fc74bd5a4fcd083f323de4bf03c15844fd30283ae7ec564fcce973a618eb7f893a3ef67ea68a22a3df8