Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-11-2024 18:29
Static task
static1
Behavioral task
behavioral1
Sample
urus.vbs
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
urus.vbs
Resource
win10v2004-20241007-en
General
-
Target
urus.vbs
-
Size
7KB
-
MD5
25de5fe745e57db4651b5f94e304bdfa
-
SHA1
4d9fa4d21d15cc0c03d854231bd70d282372bf8f
-
SHA256
407e0c29afa9d348ae940f3af63265c1625c48e9a721db9e8ebf152896747188
-
SHA512
dd493fbb8ad07334c5f7c2b747a7bceedb57ecdf09fbddb9be1f3aab507647df1ee4a5fad5b8092ba62cb20ec6545336eda0a80eff0e6f1cc9eefe8d71a56406
-
SSDEEP
96:0aEGrT5eQzzLjhYiHsE6lH1CHeWO8gjRNtjOY8GmT:fE2TV/5YiRgHaeN8gjv7mT
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/reverse_http
http://89.197.154.116:7810/INxqeV8X2ONsfm1_CojSGwEEM-uE3ldkjmKzAbS4SGewjwSXxNxPVpqjwbZdrPAArvIZkTRvbOjtehX19ggnBeY1pNXSPhdbMzp3rdTENnhsi52l_V9ANGsqF3TrNhOCkNDFy-_D_MRDdn8yVErWpL0WUtCGus_SL4JNOJ0f6
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
WScript.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation WScript.exe -
Executes dropped EXE 1 IoCs
Processes:
veZkNElXSz.exepid process 4064 veZkNElXSz.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
veZkNElXSz.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language veZkNElXSz.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
WScript.exedescription pid process target process PID 512 wrote to memory of 4064 512 WScript.exe veZkNElXSz.exe PID 512 wrote to memory of 4064 512 WScript.exe veZkNElXSz.exe PID 512 wrote to memory of 4064 512 WScript.exe veZkNElXSz.exe
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\urus.vbs"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:512 -
C:\Users\Admin\AppData\Local\Temp\radC54A0.tmp\veZkNElXSz.exe"C:\Users\Admin\AppData\Local\Temp\radC54A0.tmp\veZkNElXSz.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD508222be7ade4e01fe009ac64b3993a66
SHA1b97d48ab7adb6a6464f0b9ccb3c9f001291b4035
SHA256fe16bc0df484e6d013469cb08537aaf2b3d873aefe66262b445c9b8429f73a49
SHA5123a66e575dd62db4cac71f23cc59ee584123d9e0632509cd466d886fb1feb64b3e7f6690739a3bbbde2114c3bd4fe499b21b8cf9bc0c99736824c2400f3ce92a2