Analysis

  • max time kernel
    119s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02-10-2024 01:40

General

  • Target

    e6f2d4b6c2f36e268eb147746087928f7a0b68e974d603959a3961a7b00e1680.vbs

  • Size

    6KB

  • MD5

    d31a2cb801264fbe84209118744c5cb3

  • SHA1

    efa1ae48805fbdd1a03121822e35b80c95fbc328

  • SHA256

    e6f2d4b6c2f36e268eb147746087928f7a0b68e974d603959a3961a7b00e1680

  • SHA512

    777cb3e8f8ecc79fe2ff520d7cbcb118a0288ee823d29f7c2ab992c92f5133a1d3322577c2e727b304d5ff6806725dafaf8ccc5e98341d751358a769ff4a9651

  • SSDEEP

    96:6QbDI8DRJc5aDwFh97Hno1mZuJkoJf6zbTM0vAt0bWxiJO4/:6KD3DLcmeh9jwmZNoozbTMUA6bWiY4/

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\e6f2d4b6c2f36e268eb147746087928f7a0b68e974d603959a3961a7b00e1680.vbs"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2420
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" "C:\Users\Admin\AppData\Local\Temp\e6f2d4b6c2f36e268eb147746087928f7a0b68e974d603959a3961a7b00e1680.vbs" /elevated
      2⤵
      • Blocklisted process makes network request
      • Suspicious use of WriteProcessMemory
      PID:1844
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" https://estudosadulto.educacao.ws/deolane.mp4
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3068
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3068 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2788

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8c657870966d8b482f28cf5a5aa124eb

    SHA1

    2f96ca04a2f0b83c25ca45869539c9f092b8d9e0

    SHA256

    fe00ac1d1487309df5c8b756884f74c71fb4c0ace3ee4a2451d2bd6097cc3027

    SHA512

    0ccda6a2faf62cfa13dc12bf26b1722ee66127208fd80850759f5a934901bc061b546afa147e277cf2139f5853702f03392ad11a9fd1d4598611cfb3b7af9808

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a9c17d2da20955d5747837467cc7326c

    SHA1

    b7bbb2a288b551e2ea527f4e5a146ad25ea40d2a

    SHA256

    cfb7812a8c08d92f9cf2bf611b0c1b2e4a4c6ab7a7254202dd151dd0ca3d6c15

    SHA512

    0660d85ae2a6a0b079b140d12227c02203e911bb79c637b4f33f9c907eac7f2ef42320b38e0aa13239f3f9c6d8e6f886a7f7fad55aaf4e0abe1c32954563c244

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1c341d378816894adb9126ac17aa4010

    SHA1

    80688319cf36e729113503caf99e7c0c0c6c0ffc

    SHA256

    e4f6f46d64fe88c18fc07c701e8501e8b4985c6a20f02ac37f688eb6b5c9301a

    SHA512

    b73cff497b4437b9a5535ccce35dbdefbd10482b3d37823ccea084dd5754da228b7ade0028d34c244be581655e084234dd96de5d3d454e29afd870e4a8652565

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6be627e03daa987367572624ac40792f

    SHA1

    063cd56289f32298e89c0bc9af1f8d8dce9d5187

    SHA256

    7ab1100a9bf26d344af22831d99456aafae7e260c4b61a540fa6621a8d6df1d3

    SHA512

    e63dc0d532853946b719ae1800db8e66509e8dd4095e7b4061c244a48515312a643b15ec0871430cc2aca529e21d235662ec832fde30a1963d48d872d48996f9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7f38cf9649f7069ce2cd36eb32f742b7

    SHA1

    6db74e313abe3fe9df817f68ae935acfaf99914e

    SHA256

    235ae07aa4442683fa0e397fb4e592940d1626abd4bb5d69b482f100ad022a19

    SHA512

    2beddf8ff890f8d799188c82a0f296b14fd5ea4c8467347f89ecfec2b17878cb55d7f0908affb868a147d5d5c062b4d9d04285c42d20795778612a53e6225eeb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8622bf48befb45806d54dbba2d178eba

    SHA1

    fba1defc51192ef9a52322c2f4a6b846f635b75a

    SHA256

    9c0bae45c10b003957d9b6dadd133366a09cccce9510e1b6f2647e19995c2dcb

    SHA512

    2c34d7e5f507679db881400e7762a44acf770e63c89841f4f255bbeed3f8f00ce90b8459f1777aac21522d5ff403dc71b0e0be9ea3a38a528eea2353dd8008f6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    192a0e947b56bf29b19a253d36f8c03c

    SHA1

    6e6a66b6afb43b26bd33ae8d1d927a515e76cd43

    SHA256

    b38c806b2c480d0f44ae05b192bc0aed117ded26902f42c542282350335a4f74

    SHA512

    e48fe51fb1b7d86f9d22b351af68a18e3accf50e01aa1e846b06dfaf8aca070a0be80ad90db5a2d02a26d0aa6412ae4db72ea1e6960b3abc2f7f3c639aaeef89

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    63e91ce16e9eb645037267351aa42faa

    SHA1

    7d74ef4b8bdea4f752242ee718a11e3e0fc242c9

    SHA256

    f3e37889163e6e5df5a74f8302ea5f00a17f95671807a0905436c162fdbd02da

    SHA512

    835e7dfadf25e208a781ba830ae19c25037e69d9efc6716f5140e5d125cfcebb16c8bb8a28b085a796ef211255d99387d947e5b94acad5a3ef31078da62379e9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    61309826ab99f9561408708ea0a229a8

    SHA1

    fa3d04ea7ffacab0d42788baf6839ba8cd2a1183

    SHA256

    df01cbd105eab7a4c7cc5be2875cce721f18d77bb1344da0b67038c5f779e34f

    SHA512

    4268cf6f59460982addeeeffcd6337e2bdc8f87a94e928f7a32126ea43b9ddd290a9198c7e29297e02b37b73d40160e16731ba4591fae50c696f73e54f0f1c24

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2395d2de41baad491c8122c4976643c0

    SHA1

    9f954890b9975bcbdb06d80c8cc8914e686a722f

    SHA256

    daa2ff42bab9a334fa275e4f74f6bc8bfb443f447bac2d87b0c3b10d5c851461

    SHA512

    2ef0a8c99b023dae24edae1409458442eda4d99f44198313772fedb33600cb77a47e597ab64fd1d710f58040501dfca55b5d45f105d07a0bf853ed56607d5b97

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2f88083401aecb4cdb519739d484f528

    SHA1

    092d5473758ae67bc59910ce016b9c0121f903a3

    SHA256

    6f4b32aac25fdac1851a9349d630aa9c4d700a9a69c161aadf1492c3d87de915

    SHA512

    04537c5d9e91a74b54fe96878d7bb7f1859ce12baf0954bb64d4a5eb10e2930d4bec80cca4d51fad67171b1bcd7ebdd58921afba932676957b75d8c15df426fe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2c613875ddac7bef20eb542358f13af1

    SHA1

    e467b603270802813adad96641027cf736857484

    SHA256

    43ef48282ffdd1546d247be18daa02c465f21966bd9fb283fdd72554f945ecc3

    SHA512

    758cc6adae5d335f67f7a392f5c3b65a01d803911ad7b8d4bb4d54bb420769aa1194faf87db568208f8a3dada010308788084b07e06c5f2617d3ec1c5a4566e7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    44f7ed4b1672b02862934f6425541139

    SHA1

    9d6320f637567de2bd6900bf5900db2ca52967f0

    SHA256

    236565a5a0bdd71dd5d2e73382e55c98267d4524709338b480c17a9dcca6b300

    SHA512

    7c0913e9870186f1acc195aa9ebe790778a1627bbadc0d2a651172d20738c16498aa12a5835bcc108284461f9998ba85c0c631fc983151db173bd15d3981c8ff

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    03c55a21f22bf0e61e98790e1b909d4f

    SHA1

    15efcd3bf70738a8aa3472abd2c2b0fd7f304afa

    SHA256

    f0ff6d160fa6b5411cd138f0c34c84bab2ddce8434c56c627ad7480b3b60939e

    SHA512

    9c306a86095098d8cd58e9fcae540af33f19f1ae611476324a075067f1634a2f548bae9d5abc02dbcce99d8eab1ffd90e70b97a4402a72bd2fed2b59dc0986e5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    49c8c4bcfbb5c36022e8563fb318273f

    SHA1

    596b0a1e07289ebaa3be69704452fe4e6a6fc732

    SHA256

    51e5c2e8925c2780f413886f7e8c4d0f05acd74f312a2e4f8a19fc2670fc2685

    SHA512

    938a3f9a90366897e24eeca548afe934fe558f3299123369f73c8ff82128bb73c05f9ad1593f327079726724f209892f5734791efaa7598d9de79a685f09d575

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    69f6e6d0b96882b2e9e46284e5a06eef

    SHA1

    5104512f218fc4a4898d8a252c6cec300be4b981

    SHA256

    a3462db909cafc09b9959bb51f37ccd161e0e1d5ffc9303e40c5fa488f7148b3

    SHA512

    5512770b37b06e42fef2fe4eb0ebbce9bcb9ade768238d5ee201d1bfb91d5fa9416bed37f430a7fcbaf78ff32a60820606a02369a728c272dd543a7b5b0eb95b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5d0083b05fb11f0157fb9f1db1dbfba4

    SHA1

    34b201eb7cefe7572fb32ecf2a50a3609a97e7a1

    SHA256

    97a5ce8eabd375d9b59e00afe7784a1ee8e29fde4f45b7de21de2c13ab2b3a3b

    SHA512

    6325ebf5edbd0669345f0021a6e318311e6004e11305ab71534f1d2ee18a6ca50d0e4c069ecb58ab4c1eb34c866a979268c4594d215099de3e5bacd92fc69346

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1310486269fe6cb95326ed69eb94315f

    SHA1

    0730b9913d8d9deed328148e750bf3dc5ba0bef1

    SHA256

    2900487c24207bbfe71af1106a25a19a766a7141c072885a921ace9e283ac6ab

    SHA512

    a96beb6562ec423433459189f3da9f1ef574bb8a54a301c1b470993d1a4a473d70d38e6891ef48d4c41197c92cc1ee1435e43a3c2807c8e0c77f0e6efc6edd5d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b13ac1f43cd0b52c9ab7ed6ee0464c84

    SHA1

    8b1fb054bb33fe7f62238ecc2bf70ecb575dbd97

    SHA256

    16004cb7bff221b586cc0984586c37a48e7feae2f5708966e78ada58132aefa9

    SHA512

    d42fa8ec44532da31d9bd19fa66198b8497745c715bd4407febbb7b95a46bd3d3701f72c00cbce2675014f7cac4aaff9d6e456839ab07e5d6e37ad883787061c

  • C:\Users\Admin\AppData\Local\Temp\CabC5E1.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarC642.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b