Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-11-2024 18:29
Static task
static1
Behavioral task
behavioral1
Sample
urus.vbs
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
urus.vbs
Resource
win10v2004-20241007-en
General
-
Target
urus.vbs
-
Size
7KB
-
MD5
25de5fe745e57db4651b5f94e304bdfa
-
SHA1
4d9fa4d21d15cc0c03d854231bd70d282372bf8f
-
SHA256
407e0c29afa9d348ae940f3af63265c1625c48e9a721db9e8ebf152896747188
-
SHA512
dd493fbb8ad07334c5f7c2b747a7bceedb57ecdf09fbddb9be1f3aab507647df1ee4a5fad5b8092ba62cb20ec6545336eda0a80eff0e6f1cc9eefe8d71a56406
-
SSDEEP
96:0aEGrT5eQzzLjhYiHsE6lH1CHeWO8gjRNtjOY8GmT:fE2TV/5YiRgHaeN8gjv7mT
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/reverse_http
http://89.197.154.116:7810/INxqeV8X2ONsfm1_CojSGwEEM-uE3ldkjmKzAbS4SGewjwSXxNxPVpqjwbZdrPAArvIZkTRvbOjtehX19ggnBeY1pNXSPhdbMzp3rdTENnhsi52l_V9ANGsqF3TrNhOCkNDFy-_D_MRDdn8yVErWpL0WUtCGus_SL4JNOJ0f6
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Executes dropped EXE 1 IoCs
Processes:
veZkNElXSz.exepid process 2052 veZkNElXSz.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
veZkNElXSz.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language veZkNElXSz.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
WScript.exedescription pid process target process PID 2384 wrote to memory of 2052 2384 WScript.exe veZkNElXSz.exe PID 2384 wrote to memory of 2052 2384 WScript.exe veZkNElXSz.exe PID 2384 wrote to memory of 2052 2384 WScript.exe veZkNElXSz.exe PID 2384 wrote to memory of 2052 2384 WScript.exe veZkNElXSz.exe
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\urus.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\radCD6ED.tmp\veZkNElXSz.exe"C:\Users\Admin\AppData\Local\Temp\radCD6ED.tmp\veZkNElXSz.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD508222be7ade4e01fe009ac64b3993a66
SHA1b97d48ab7adb6a6464f0b9ccb3c9f001291b4035
SHA256fe16bc0df484e6d013469cb08537aaf2b3d873aefe66262b445c9b8429f73a49
SHA5123a66e575dd62db4cac71f23cc59ee584123d9e0632509cd466d886fb1feb64b3e7f6690739a3bbbde2114c3bd4fe499b21b8cf9bc0c99736824c2400f3ce92a2