Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    21/11/2024, 08:39

General

  • Target

    d6efa90d2b7cf0aabc00d25c40b9cef231ab81b055c6b5e47655630bb1cc62bf.vbe

  • Size

    1.6MB

  • MD5

    76c9e79512fae43cf3418e7ffd2e6d7e

  • SHA1

    83604bad711a92e9ec62a342311c8d3701f75516

  • SHA256

    d6efa90d2b7cf0aabc00d25c40b9cef231ab81b055c6b5e47655630bb1cc62bf

  • SHA512

    981d53e103297efbca428c2ff41d216af21979d4818605066a2da6aca1bfee05b0fe9d1f4a3aae7b561d1e14526d5063ead985250724c0ba748eef7be7066bb2

  • SSDEEP

    24576:tjkxjYmgPzdgQpoaDR5zPYNUgMbHORCOWsIGKA4SLAGIV2RwtZ3AQEyrPvbvGcUW:R

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\d6efa90d2b7cf0aabc00d25c40b9cef231ab81b055c6b5e47655630bb1cc62bf.vbe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2412
    • C:\Users\Admin\AppData\Local\Temp\temp_WmK7B.exe
      "C:\Users\Admin\AppData\Local\Temp\temp_WmK7B.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2060
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:1304

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\temp_WmK7B.exe

    Filesize

    774KB

    MD5

    36972ab0b73f25f92b42448d6faaea58

    SHA1

    18782056df033e6602800453fde691cdd15262f9

    SHA256

    ea2416415a1453f3431f33b2cbad63d8496f7c4450c021be197e52d8e23fe84e

    SHA512

    b035957f5a6dbe31978670e618a6dbfa461b864971e1a0429fee7dfb17330a3d19fc29f0649f08888488cf8fba51e48f0cc18e0af0fd0f654ad77326d1f76861

  • memory/1304-9-0x0000000000400000-0x0000000000447000-memory.dmp

    Filesize

    284KB

  • memory/1304-10-0x0000000000400000-0x0000000000447000-memory.dmp

    Filesize

    284KB

  • memory/1304-12-0x0000000000400000-0x0000000000447000-memory.dmp

    Filesize

    284KB

  • memory/1304-11-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/1304-14-0x0000000002560000-0x0000000002863000-memory.dmp

    Filesize

    3.0MB

  • memory/1304-15-0x0000000000400000-0x0000000000447000-memory.dmp

    Filesize

    284KB

  • memory/1304-16-0x0000000000400000-0x0000000000447000-memory.dmp

    Filesize

    284KB

  • memory/2060-6-0x00000000744DE000-0x00000000744DF000-memory.dmp

    Filesize

    4KB

  • memory/2060-7-0x0000000000B20000-0x0000000000BE8000-memory.dmp

    Filesize

    800KB

  • memory/2060-8-0x00000000744D0000-0x0000000074BBE000-memory.dmp

    Filesize

    6.9MB

  • memory/2060-13-0x00000000744D0000-0x0000000074BBE000-memory.dmp

    Filesize

    6.9MB