Analysis

  • max time kernel
    103s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/03/2025, 15:13

General

  • Target

    0990c7d37d39c4185a5f0dac7aeda754.vbs

  • Size

    7KB

  • MD5

    0990c7d37d39c4185a5f0dac7aeda754

  • SHA1

    de8d15fd649c676b757687322e6d475b1824b7ea

  • SHA256

    ab6b0dc77b4b5cf9e82d8500889f65ef1714da2222f70821ce159d110d294d56

  • SHA512

    8de3c234e5a148233118bb414ea7564c075976e2647c5d900e834454289961bc3696be7008ce522e61f9134f2786fbe1ef1bd2ebbe49e49ff2ba8946e21516ec

  • SSDEEP

    96:st/S5eXXTzxPdG69X/UrI1aTdENupeBbRS3X7r0vA4MM61Ft8gVDBRSSApMmzZ:s/SOXfxVGTddEYD3XflrWgVDGSAphZ

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

89.197.154.115:7700

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Metasploit family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\0990c7d37d39c4185a5f0dac7aeda754.vbs"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3692
    • C:\Users\Admin\AppData\Local\Temp\rad7569C.tmp\wnbfPEuPWr.exe
      "C:\Users\Admin\AppData\Local\Temp\rad7569C.tmp\wnbfPEuPWr.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3920

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rad7569C.tmp\wnbfPEuPWr.exe

    Filesize

    4KB

    MD5

    60676088cdb0b8239e885af286d931d6

    SHA1

    aa8732697bbe262a230844304d30a373fc398dfd

    SHA256

    62f891b9219658feb675775b4d9473e7b4e684323791576ed381b91fbb0fdddf

    SHA512

    9c7b15e2f0738eb0b5f911d47d1a5a345a013999035a48438b302a226eefb05dac26fadf0eaea7c25f6ae3c703146b00c05025c660cc384566aacd269b9082c9

  • memory/3920-7-0x0000000000400000-0x0000000000404000-memory.dmp

    Filesize

    16KB

  • memory/3920-9-0x0000000000400000-0x0000000000404000-memory.dmp

    Filesize

    16KB