Analysis
-
max time kernel
140s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22-09-2024 17:21
Static task
static1
Behavioral task
behavioral1
Sample
67c7e405ab3003e31c4a5b644018f533.vbs
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
67c7e405ab3003e31c4a5b644018f533.vbs
Resource
win10v2004-20240802-en
General
-
Target
67c7e405ab3003e31c4a5b644018f533.vbs
-
Size
7KB
-
MD5
67c7e405ab3003e31c4a5b644018f533
-
SHA1
0fa769646f98dadacb56a1403fbfee7b093a00ad
-
SHA256
2480ce678b0f1dadd044daeadd54b619ae0d85d338d8bb6ec088b90df33e6f9c
-
SHA512
5a79fd9bc7fd609afaabba9ee7f6821c0cdc9a2573ee0f8b7479e922eb58473a8fed71d150084bb66a5b92e302ec7d33894c8a3b522fee1b120d279e9ba66fb2
-
SSDEEP
96:h4D2/N5eIpp/DWL6jFWt2fk2WL2DzGZy9DXW61GY4SXou:qD2/N1nqOhQL2dzTlXWwDZXou
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/reverse_tcp
89.197.154.116:7810
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation WScript.exe -
Executes dropped EXE 1 IoCs
pid Process 3156 wFiDrQJMtDm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wFiDrQJMtDm.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2812 wrote to memory of 3156 2812 WScript.exe 82 PID 2812 wrote to memory of 3156 2812 WScript.exe 82 PID 2812 wrote to memory of 3156 2812 WScript.exe 82
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\67c7e405ab3003e31c4a5b644018f533.vbs"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Users\Admin\AppData\Local\Temp\radE76AD.tmp\wFiDrQJMtDm.exe"C:\Users\Admin\AppData\Local\Temp\radE76AD.tmp\wFiDrQJMtDm.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3156
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD50b624b2d6c33c81b676919c0832f066d
SHA1c1ae4092a7e46d1a806015db782efbf1f9d8e26c
SHA2565a9beed90e687b7e14e1b923cb5247763d742171bedcd0f60d38013624c89f30
SHA512b74215eac65ca09b9b76db0938638ea7b34397ea161078310f252e1c139ad8b29a2f002171a84b643d0ce9612e74537c73afb0f80d2284b5dc3f72e88b589922