Analysis

  • max time kernel
    93s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-11-2024 18:29

General

  • Target

    urus.vbs

  • Size

    7KB

  • MD5

    25de5fe745e57db4651b5f94e304bdfa

  • SHA1

    4d9fa4d21d15cc0c03d854231bd70d282372bf8f

  • SHA256

    407e0c29afa9d348ae940f3af63265c1625c48e9a721db9e8ebf152896747188

  • SHA512

    dd493fbb8ad07334c5f7c2b747a7bceedb57ecdf09fbddb9be1f3aab507647df1ee4a5fad5b8092ba62cb20ec6545336eda0a80eff0e6f1cc9eefe8d71a56406

  • SSDEEP

    96:0aEGrT5eQzzLjhYiHsE6lH1CHeWO8gjRNtjOY8GmT:fE2TV/5YiRgHaeN8gjv7mT

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/reverse_http

C2

http://89.197.154.116:7810/INxqeV8X2ONsfm1_CojSGwEEM-uE3ldkjmKzAbS4SGewjwSXxNxPVpqjwbZdrPAArvIZkTRvbOjtehX19ggnBeY1pNXSPhdbMzp3rdTENnhsi52l_V9ANGsqF3TrNhOCkNDFy-_D_MRDdn8yVErWpL0WUtCGus_SL4JNOJ0f6

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Metasploit family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\urus.vbs"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:512
    • C:\Users\Admin\AppData\Local\Temp\radC54A0.tmp\veZkNElXSz.exe
      "C:\Users\Admin\AppData\Local\Temp\radC54A0.tmp\veZkNElXSz.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4064

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\radC54A0.tmp\veZkNElXSz.exe

    Filesize

    4KB

    MD5

    08222be7ade4e01fe009ac64b3993a66

    SHA1

    b97d48ab7adb6a6464f0b9ccb3c9f001291b4035

    SHA256

    fe16bc0df484e6d013469cb08537aaf2b3d873aefe66262b445c9b8429f73a49

    SHA512

    3a66e575dd62db4cac71f23cc59ee584123d9e0632509cd466d886fb1feb64b3e7f6690739a3bbbde2114c3bd4fe499b21b8cf9bc0c99736824c2400f3ce92a2

  • memory/4064-7-0x0000000000400000-0x0000000000404000-memory.dmp

    Filesize

    16KB

  • memory/4064-9-0x0000000000400000-0x0000000000404000-memory.dmp

    Filesize

    16KB