Analysis

  • max time kernel
    1797s
  • max time network
    1808s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241211-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    13-12-2024 18:01

General

  • Target

    The-MALWARE-Repo-master/Worm/HeadTail.vbs

  • Size

    33KB

  • MD5

    e0a3ab130609c80b452ee423d3a55355

  • SHA1

    f5408df5f8d2765738db8f5080bb88cab105c038

  • SHA256

    af1de4b7c65071f490cfd1425c45c9538fd7888cb7dc509304d8ec11cb046649

  • SHA512

    9326653d66a9866d517cdcdeb1abdf3fb8fdb2a8bc8c2324c916c10aabc7d5ca417c54c7409f0df6454041ad4c446b06b56510e7cc1eaa2b3cf54ec47cb79ae4

  • SSDEEP

    384:qKNaNYf1S4FeNnbtFrN+rSNENOfX1h8Z6SLWqnLTNgH1N+qN+u0gjL7N:bGYf1S4YnJFZ+r+kOflh8fLBQ+2+uL7N

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops autorun.inf file 1 TTPs 4 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 28 IoCs
  • Drops file in Windows directory 64 IoCs
  • Modifies registry class 10 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\The-MALWARE-Repo-master\Worm\HeadTail.vbs"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Drops autorun.inf file
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    PID:3228

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\1033\README.HTM

    Filesize

    33KB

    MD5

    bef172f88a10b228d511bfd99ce87ceb

    SHA1

    2c5f91cbaf0fefce1d7b223f669f78288135de3a

    SHA256

    6adc90bc3991aabdee692a200a7f3ac55bd0380ab630950c76e07d8f325afc9a

    SHA512

    acab512911bf0fa46ebd00b13968b42c932d3f6e70e2df230a5a044847d3464367b61416388fb932bb58d1a65cbdb0979d43cccedfc619c30460fd2e149d268b

  • C:\Users\Admin\AppData\Local\Temp\The-MALWARE-Repo-master\Trojan\Bolbi.vbs

    Filesize

    80KB

    MD5

    7109abdb84ee6b4118467813c7ad3f85

    SHA1

    3e00fbe41f70d439c07158a59ad507540ce1144f

    SHA256

    3e0c9f0807ded7c4a188a8a86592ffd7e607cea13e21449b4ca6df52033708de

    SHA512

    9d7211fbc6147805e0e797c6de911a20bb9810efa4087888373c7801f5057d3e326866e7ada93ae705a6502e08f272d42389c666c4e717739e7e0a95a9a5c405

  • C:\Windows\System32\Administrator.vbs

    Filesize

    33KB

    MD5

    d832f8583530055db484e3f99011500c

    SHA1

    c3b90874bd371f5b79451f807c6ce2836ceb2067

    SHA256

    ae3b9ca35308d8f8963642b3886ae4094ab6903f96f7ccb74886ddcbb349a832

    SHA512

    c8785d19928a84268f5c0cb4d31f55dc65ad058fe61ec3093528b61ad18f9c79c2e6091ef2879f93e2e7bd607c7152440c2e2843b5ddf7cf8a93bd7697959002