Analysis
-
max time kernel
137s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 05:48
Static task
static1
Behavioral task
behavioral1
Sample
E-Post Label.vbs
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
E-Post Label.vbs
Resource
win10v2004-20240802-en
General
-
Target
E-Post Label.vbs
-
Size
249KB
-
MD5
26a2367b6a0035d899ff71de3322c0a6
-
SHA1
887b82684544efe2441603763a1f8a34ddee4358
-
SHA256
0a2e4facb3402296c3d0734d3515a6f428819f6dfb4d9a06fc8d6d75fc3953d2
-
SHA512
3985000c57cd0ff1d65bb7a1d94d8505df69b4c376556fc74bd5a4fcd083f323de4bf03c15844fd30283ae7ec564fcce973a618eb7f893a3ef67ea68a22a3df8
-
SSDEEP
768:s109A1DgI0MTlpSqJpDET4ETR+GJosPJ+yE0voKETTjiPLhcUkrNoc:3MqPJ+L+DOCPLFkBr
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\PoMtDTSxSaWXDpMWPkdaoXwwo.vbs\"" WScript.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\PoMtDTSxSaWXDpMWPkdaoXwwo = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\PoMtDTSxSaWXDpMWPkdaoXwwo.vbs\"" WScript.exe -
Blocklisted process makes network request 4 IoCs
flow pid Process 21 1308 WScript.exe 34 1308 WScript.exe 43 1308 WScript.exe 44 1308 WScript.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation WScript.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\PoMtDTSxSaWXDpMWPkdaoXwwo = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\PoMtDTSxSaWXDpMWPkdaoXwwo.vbs\"" WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\PoMtDTSxSaWXDpMWPkdaoXwwo = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\PoMtDTSxSaWXDpMWPkdaoXwwo.vbs\"" WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings WScript.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3980 schtasks.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3268 wrote to memory of 1308 3268 WScript.exe 83 PID 3268 wrote to memory of 1308 3268 WScript.exe 83 PID 1308 wrote to memory of 3980 1308 WScript.exe 90 PID 1308 wrote to memory of 3980 1308 WScript.exe 90 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\E-Post Label.vbs"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3268 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\PoMtDTSxSaWXDpMWPkdaoXwwo.vbs"2⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Blocklisted process makes network request
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc ONLOGON /tn ChromeUpdate /tr "C:\Users\Admin\AppData\Roaming\PoMtDTSxSaWXDpMWPkdaoXwwo.vbs" /F3⤵
- Scheduled Task/Job: Scheduled Task
PID:3980
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
249KB
MD526a2367b6a0035d899ff71de3322c0a6
SHA1887b82684544efe2441603763a1f8a34ddee4358
SHA2560a2e4facb3402296c3d0734d3515a6f428819f6dfb4d9a06fc8d6d75fc3953d2
SHA5123985000c57cd0ff1d65bb7a1d94d8505df69b4c376556fc74bd5a4fcd083f323de4bf03c15844fd30283ae7ec564fcce973a618eb7f893a3ef67ea68a22a3df8