Analysis

  • max time kernel
    148s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08-10-2024 12:47

General

  • Target

    111.vbe

  • Size

    11KB

  • MD5

    f4f90d06813ebae0cf591acfc33a9b72

  • SHA1

    4f9563282b62e08ac9e31856c8394ffa474f6c15

  • SHA256

    5e8f82fa0592f63a811dea02c5875cc502ff322bbdf855de1b71e2399ec8f029

  • SHA512

    42b643ead7537c5a7ef63fde8eed3d75211cd0f39bdcefd79afd0345f00c2627f0a6f8120a1c1be1c947ed0e1c0ee8970d688221ff9f40572d3c6806b7b806b5

  • SSDEEP

    192:kVPCg3XXH2AYKtbXq1qFqpSJ7sWfqH2hmDaOdC8NhuOzWNEK:cH3XXH2aA1qFkiQWfq2mDLdCpxF

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Drops file in System32 directory 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 19 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\111.vbe"
    1⤵
    • Blocklisted process makes network request
    PID:2136
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {279564A4-703D-4904-8E6B-F6DEA0B9ED3F} S-1-5-21-457978338-2990298471-2379561640-1000:WOUOSVRD\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2120
    • C:\Windows\System32\WScript.exe
      C:\Windows\System32\WScript.exe "C:\Users\Admin\AppData\Roaming\QIbTTutRfdLJtpX.vbs"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2948
      • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
        3⤵
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2728
        • C:\Windows\system32\wermgr.exe
          "C:\Windows\system32\wermgr.exe" "-outproc" "2728" "1252"
          4⤵
            PID:2764
        • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
          3⤵
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2456
          • C:\Windows\system32\wermgr.exe
            "C:\Windows\system32\wermgr.exe" "-outproc" "2456" "1248"
            4⤵
              PID:2776
          • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
            3⤵
            • Drops file in System32 directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1968
            • C:\Windows\system32\wermgr.exe
              "C:\Windows\system32\wermgr.exe" "-outproc" "1968" "1260"
              4⤵
                PID:2444
            • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
              3⤵
              • Drops file in System32 directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1228
              • C:\Windows\system32\wermgr.exe
                "C:\Windows\system32\wermgr.exe" "-outproc" "1228" "1256"
                4⤵
                  PID:2092
              • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                3⤵
                • Drops file in System32 directory
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1960
                • C:\Windows\system32\wermgr.exe
                  "C:\Windows\system32\wermgr.exe" "-outproc" "1960" "1252"
                  4⤵
                    PID:1976
                • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                  3⤵
                  • Drops file in System32 directory
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:1916
                  • C:\Windows\system32\wermgr.exe
                    "C:\Windows\system32\wermgr.exe" "-outproc" "1916" "1260"
                    4⤵
                      PID:1932
                  • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                    "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                    3⤵
                    • Drops file in System32 directory
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:572
                    • C:\Windows\system32\wermgr.exe
                      "C:\Windows\system32\wermgr.exe" "-outproc" "572" "1256"
                      4⤵
                        PID:2068
                    • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                      "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                      3⤵
                      • Drops file in System32 directory
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:2252
                      • C:\Windows\system32\wermgr.exe
                        "C:\Windows\system32\wermgr.exe" "-outproc" "2252" "1140"
                        4⤵
                          PID:2088
                      • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                        "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                        3⤵
                        • Drops file in System32 directory
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:2308
                        • C:\Windows\system32\wermgr.exe
                          "C:\Windows\system32\wermgr.exe" "-outproc" "2308" "1252"
                          4⤵
                            PID:2204
                        • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                          "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                          3⤵
                          • Drops file in System32 directory
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:1876
                          • C:\Windows\system32\wermgr.exe
                            "C:\Windows\system32\wermgr.exe" "-outproc" "1876" "1252"
                            4⤵
                              PID:288
                      • C:\Program Files\VideoLAN\VLC\vlc.exe
                        "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\SaveSplit.mp4"
                        1⤵
                        • Suspicious behavior: AddClipboardFormatListener
                        • Suspicious behavior: GetForegroundWindowSpam
                        • Suspicious use of FindShellTrayWindow
                        • Suspicious use of SendNotifyMessage
                        • Suspicious use of SetWindowsHookEx
                        PID:1972

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259507931.txt

                        Filesize

                        1KB

                        MD5

                        6f003edfff939bd0b442894f6b3b20bd

                        SHA1

                        3bdf1256f53b4cee547c32c909d940d5a094f070

                        SHA256

                        b890b34a231264d7028a983cc693a26555e3fb2f6abe6075d6493db87cf87342

                        SHA512

                        a1e66532e090abae1b42c5a5b846cda99f7406c746becfdbfacce5f2ab06bc82448f370ba599b92a3eac79a14767d4c36ef1170dbee69c394d39d5f1579824fd

                      • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259522811.txt

                        Filesize

                        1KB

                        MD5

                        35aa22ba8de6cf61ab2353c91deb625d

                        SHA1

                        420ba9b9941f33b70d02c3d8901c2fb5fb734739

                        SHA256

                        882f1f05e684cf1ab54c5264069ce424e4284950f35299e038d1df817b0d7876

                        SHA512

                        d4002be0d7f3f91f288fd9162c1038a5515f497b3c34d8134993eda64ad00bbd82903a959bf5a76f6a23795d29b432534f54cc018ad5f9087c4ab98f00c497f1

                      • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259540251.txt

                        Filesize

                        1KB

                        MD5

                        3fde8399ffcbb0ff1fd34d06d9759bb4

                        SHA1

                        11e82f1ecf31b0ef3745cd106377f32ec08b1e4e

                        SHA256

                        2bff86fcdc1115a91d2568c4011cc155d4a62eb4e563b9eb636a6d6e07fdfec3

                        SHA512

                        ab465bcf8a869ee712e8571d0a8ff9b83af35d3e4c54834eca433f452143c404b09855a4203ac040bb11cbf4c5c91ef908fefa33bda0a9c7b8d70676577eed35

                      • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259556399.txt

                        Filesize

                        1KB

                        MD5

                        c3c50a30520c3f244e2398cf8152244e

                        SHA1

                        a64f4727e27f6f4ff78bd46dcdf297fb21600277

                        SHA256

                        41e678c3c21efaff92d4d980ce277856de11f1dd213849c6139195dce1c589c8

                        SHA512

                        6b2c23473c24b5465cf281c235fbe43b761008da3597a1d6a91a8b12425a1da8a3b09ca992928bf59c6fea2efbc1ddfe825fdb91c865d8869d5d660b6dff836e

                      • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259570907.txt

                        Filesize

                        1KB

                        MD5

                        5e826306bdc8e067cc0490a6bb186373

                        SHA1

                        4c891bc20116b739f59cb9a930f33dd3ca1efe23

                        SHA256

                        4d14c87bae72d5339e39dc1ecd15dd2e450e195b84c9aec0a46cf8c599963471

                        SHA512

                        95754218bad0aaa8af92f890878d2e6c6610f15f10bb5ce62ae55e1131144adaa2ae2a082075557662c85ca2af2b009450139c85dfec1fdeb093c79235857887

                      • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259584901.txt

                        Filesize

                        1KB

                        MD5

                        e60b4a9949ff89f76172eb37c701fe5f

                        SHA1

                        356f9a2ce5e2f90e98b0bb20557a942d5ccb4c8d

                        SHA256

                        b88a7c47b86f8f5c8fccf6f7bbf2885609296558d90b168d330408317a1fb83c

                        SHA512

                        8225db5db3b2066a054d9c1026b6a5a57925c9f559c626729441afc8c22478c6dd07f04084c178451ede836231d93192b584d39f616e5fc9fb94a1d461cb83f3

                      • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259613412.txt

                        Filesize

                        1KB

                        MD5

                        f0c322000203b69491d7b2d3247b458d

                        SHA1

                        a606d463d1f2cb3086ce37a1613614d2d60a987b

                        SHA256

                        8698f2c996f3710f3f185534edb8762f13eb1f1aebcd4363ed954ab20466243b

                        SHA512

                        1f631563ecdd986125d48523cb56aa54722ed11750d5193b2348a4b94144a6534f2f85665762b01901c9fe88c3fb22acdf895e4f93c2886367a256942346b339

                      • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259615735.txt

                        Filesize

                        1KB

                        MD5

                        d801f80c81ba9bc07e21a36c5c003d9a

                        SHA1

                        3140e70f089de020e34a8e0b4c584317da4a689c

                        SHA256

                        1730a9d7f8736cc3a18498e0b42aa216ec1c382706a517b0aaf7af2bcbe127a8

                        SHA512

                        9a04daaa1b2087117dd3df8bf37be8a4a7896f23fb238c50a08deacedf84e6f40dd14b1df27cbdb8bc6cf47a1a3778709130b349aa923f05c8d5276057805718

                      • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259633032.txt

                        Filesize

                        1KB

                        MD5

                        0d0c39ea5190a208a07b2e540a512991

                        SHA1

                        c921ac7d43bcbff7e15c9562720658a23208eb35

                        SHA256

                        f65991dace13ce1496cebfda760df3f03f5fabd3bca49eb3a47a40619dea6915

                        SHA512

                        3be26940a9a4f16e31f32562d2d53a5198db7dd1240a4f0512bfc665bdae683756ad39ec8454498a80d1cca7c21a8a21dfeecd8d248954fab8538b40808d9be3

                      • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259646884.txt

                        Filesize

                        1KB

                        MD5

                        b2024505f296d2fdb819ae45f51cbf67

                        SHA1

                        e208d8e3b036fd3c7aa89a51b7de5930164908c8

                        SHA256

                        d87c128849c2629ba400e3b421c276f503ab718d8f3cc77f9450e757f291db33

                        SHA512

                        cfe6028fa43113b7dc040e8ffab02861a1a65ba07053b21274f119694810e5f95b8d6796c798c998c1ab10117e18f0fd6fa340d38d6cf61866dca620f0fd5a5f

                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                        Filesize

                        7KB

                        MD5

                        074a3a1d74d1c26e1a57068d75d35894

                        SHA1

                        420bd48c99328c1dc66e7738784a299569ee49e7

                        SHA256

                        9ecdeaf66497e91b202bcec792a826383c1a43d1f342b2598baae514f267ef81

                        SHA512

                        bbac6862eaad12b6cd80718f13845e7087034e1329b1101a7928224f86f0f4f917812b5dcae7f3c0703df1fecef187db01fc4c530158ce0215f0578e31e1cfca

                      • C:\Users\Admin\AppData\Roaming\QIbTTutRfdLJtpX.vbs

                        Filesize

                        2KB

                        MD5

                        b60eb1408d589af97d9046b0de991ed2

                        SHA1

                        35b90248cd3f3253fbfaf80209de49e0321a6df1

                        SHA256

                        c9979fa459b5b5478dbc5bddf16723808c6946a613267e3b4c4cdcebb3b6abaa

                        SHA512

                        09567b9c43443a9e44b90f7c5a33742a86ffd44fb9ab44e0dd6e6e0d096b06fcca130c6ac16ab200f32c07fa6e2fc0dad8c19802334ad9232f696cf59355dcf3

                      • memory/1972-87-0x000007FEEB3E0000-0x000007FEEB560000-memory.dmp

                        Filesize

                        1.5MB

                      • memory/1972-78-0x000007FEF16F0000-0x000007FEF1747000-memory.dmp

                        Filesize

                        348KB

                      • memory/1972-60-0x000007FEF2600000-0x000007FEF2611000-memory.dmp

                        Filesize

                        68KB

                      • memory/1972-55-0x000007FEF61F0000-0x000007FEF64A6000-memory.dmp

                        Filesize

                        2.7MB

                      • memory/1972-59-0x000007FEF65D0000-0x000007FEF65E7000-memory.dmp

                        Filesize

                        92KB

                      • memory/1972-63-0x000007FEF19F0000-0x000007FEF1BFB000-memory.dmp

                        Filesize

                        2.0MB

                      • memory/1972-65-0x000007FEF19A0000-0x000007FEF19E1000-memory.dmp

                        Filesize

                        260KB

                      • memory/1972-67-0x000007FEF1950000-0x000007FEF1968000-memory.dmp

                        Filesize

                        96KB

                      • memory/1972-66-0x000007FEF1970000-0x000007FEF1991000-memory.dmp

                        Filesize

                        132KB

                      • memory/1972-74-0x000007FEF1860000-0x000007FEF1890000-memory.dmp

                        Filesize

                        192KB

                      • memory/1972-76-0x000007FEF1770000-0x000007FEF17EC000-memory.dmp

                        Filesize

                        496KB

                      • memory/1972-79-0x000007FEF16C0000-0x000007FEF16E8000-memory.dmp

                        Filesize

                        160KB

                      • memory/1972-86-0x000007FEF15B0000-0x000007FEF15C3000-memory.dmp

                        Filesize

                        76KB

                      • memory/1972-62-0x000007FEF1C00000-0x000007FEF1C11000-memory.dmp

                        Filesize

                        68KB

                      • memory/1972-88-0x000007FEEB3C0000-0x000007FEEB3D7000-memory.dmp

                        Filesize

                        92KB

                      • memory/1972-85-0x000007FEF15D0000-0x000007FEF15F1000-memory.dmp

                        Filesize

                        132KB

                      • memory/1972-84-0x000007FEF1600000-0x000007FEF1612000-memory.dmp

                        Filesize

                        72KB

                      • memory/1972-83-0x000007FEF1620000-0x000007FEF1631000-memory.dmp

                        Filesize

                        68KB

                      • memory/1972-82-0x000007FEF1640000-0x000007FEF1663000-memory.dmp

                        Filesize

                        140KB

                      • memory/1972-81-0x000007FEF1670000-0x000007FEF1688000-memory.dmp

                        Filesize

                        96KB

                      • memory/1972-80-0x000007FEF1690000-0x000007FEF16B4000-memory.dmp

                        Filesize

                        144KB

                      • memory/1972-61-0x000007FEF1C20000-0x000007FEF1C3D000-memory.dmp

                        Filesize

                        116KB

                      • memory/1972-77-0x000007FEF1750000-0x000007FEF1761000-memory.dmp

                        Filesize

                        68KB

                      • memory/1972-64-0x000007FEEDA70000-0x000007FEEEB20000-memory.dmp

                        Filesize

                        16.7MB

                      • memory/1972-75-0x000007FEF17F0000-0x000007FEF1857000-memory.dmp

                        Filesize

                        412KB

                      • memory/1972-73-0x000007FEF1890000-0x000007FEF18A8000-memory.dmp

                        Filesize

                        96KB

                      • memory/1972-72-0x000007FEF18B0000-0x000007FEF18C1000-memory.dmp

                        Filesize

                        68KB

                      • memory/1972-71-0x000007FEF18D0000-0x000007FEF18EB000-memory.dmp

                        Filesize

                        108KB

                      • memory/1972-70-0x000007FEF18F0000-0x000007FEF1901000-memory.dmp

                        Filesize

                        68KB

                      • memory/1972-69-0x000007FEF1910000-0x000007FEF1921000-memory.dmp

                        Filesize

                        68KB

                      • memory/1972-68-0x000007FEF1930000-0x000007FEF1941000-memory.dmp

                        Filesize

                        68KB

                      • memory/1972-58-0x000007FEF7170000-0x000007FEF7181000-memory.dmp

                        Filesize

                        68KB

                      • memory/1972-57-0x000007FEF7190000-0x000007FEF71A7000-memory.dmp

                        Filesize

                        92KB

                      • memory/1972-56-0x000007FEF7420000-0x000007FEF7438000-memory.dmp

                        Filesize

                        96KB

                      • memory/1972-54-0x000007FEF7270000-0x000007FEF72A4000-memory.dmp

                        Filesize

                        208KB

                      • memory/1972-53-0x000000013F5A0000-0x000000013F698000-memory.dmp

                        Filesize

                        992KB

                      • memory/2456-16-0x000000001B260000-0x000000001B542000-memory.dmp

                        Filesize

                        2.9MB

                      • memory/2456-17-0x00000000023F0000-0x00000000023F8000-memory.dmp

                        Filesize

                        32KB

                      • memory/2728-6-0x000000001B320000-0x000000001B602000-memory.dmp

                        Filesize

                        2.9MB

                      • memory/2728-7-0x0000000001F40000-0x0000000001F48000-memory.dmp

                        Filesize

                        32KB

                      • memory/2728-8-0x00000000026F0000-0x00000000026F8000-memory.dmp

                        Filesize

                        32KB