Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    01-09-2023 18:30

General

  • Target

    37e87d44d8298e607b0aeee2d06f42709e3bc4375033c0e18a7231179a83daef.exe

  • Size

    1.1MB

  • MD5

    1c5acb1b125db47316673a626ff87600

  • SHA1

    1037cde50ee950106da8f38994f4999ef7285006

  • SHA256

    37e87d44d8298e607b0aeee2d06f42709e3bc4375033c0e18a7231179a83daef

  • SHA512

    c9b67edf0fc27ca64ccf8341d97ce54d58a53a51a1a3b794dda3a338a98d0a09e7298e0f899e3e5583b6fc03ff8cf6f34f5a624029b8c3b38fe60f41a7a36b0a

  • SSDEEP

    24576:4qg8zeKPja85nd0T9RAN0P30mqym6hzsGoRlG4qqjwg1mRWRuH:44zeI/0XqymkulG4qmxmiuH

Score
7/10

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\37e87d44d8298e607b0aeee2d06f42709e3bc4375033c0e18a7231179a83daef.exe
    "C:\Users\Admin\AppData\Local\Temp\37e87d44d8298e607b0aeee2d06f42709e3bc4375033c0e18a7231179a83daef.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3024
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
      2⤵
        PID:2684
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
        2⤵
          PID:2672

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\Microsoft\Config.ini

        Filesize

        92B

        MD5

        5611518085f0e601b7af262b73ca1e21

        SHA1

        679e284b4e15030b11e9fcab9e54090f6128c6c2

        SHA256

        8e59e3dc5427519534af0cfb2713d94388d03240f4f6d2c9ec6a13db1d9812ab

        SHA512

        0fc4c396d00386c7942366bab8bf30b59723f4a8b0d5bfe00dbc4a74df13acb68cd6616694a81de199bcd2409ff41b6dcaca931614165deefadd728350c52bcc

      • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

        Filesize

        753B

        MD5

        29da765d992ea979c2f9bafdd6dcb5f2

        SHA1

        ea6f0c4938e9b6632fb38b9e0072bd9854b60e28

        SHA256

        9da468bb26dcdaa47d98040b16d9aa2b258c8d5939f81a71f055c4593ff5775d

        SHA512

        c142bc8be1d352e7fba2badb1dca3c290f326873b597352e33cef3d18c3a565e7cc20bfad7f06fdc054229aa02e4f3952003fe5c8a32aed648be6b396d240ae0

      • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

        Filesize

        753B

        MD5

        29da765d992ea979c2f9bafdd6dcb5f2

        SHA1

        ea6f0c4938e9b6632fb38b9e0072bd9854b60e28

        SHA256

        9da468bb26dcdaa47d98040b16d9aa2b258c8d5939f81a71f055c4593ff5775d

        SHA512

        c142bc8be1d352e7fba2badb1dca3c290f326873b597352e33cef3d18c3a565e7cc20bfad7f06fdc054229aa02e4f3952003fe5c8a32aed648be6b396d240ae0

      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

        Filesize

        1.1MB

        MD5

        8c6ca9605f94e1b93a30dac823faecb0

        SHA1

        dc6f6995021ff282656adf2c34fc3c8bcae9ed0f

        SHA256

        eb668ad5d4931d879c1c11c6f71878c96b2a87254a7ee6d65eaf11a74868bd3a

        SHA512

        adb5fbba1ee1b3c6ee72c02f2e42bd0e4344a8212fa80f8f43912a484b00c85ea5e8bc833a2487421ebcf564fec344094c1d5c84cd3804f2f246080c9db72b38

      • \Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

        Filesize

        1.1MB

        MD5

        8c6ca9605f94e1b93a30dac823faecb0

        SHA1

        dc6f6995021ff282656adf2c34fc3c8bcae9ed0f

        SHA256

        eb668ad5d4931d879c1c11c6f71878c96b2a87254a7ee6d65eaf11a74868bd3a

        SHA512

        adb5fbba1ee1b3c6ee72c02f2e42bd0e4344a8212fa80f8f43912a484b00c85ea5e8bc833a2487421ebcf564fec344094c1d5c84cd3804f2f246080c9db72b38

      • \Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

        Filesize

        1.1MB

        MD5

        8c6ca9605f94e1b93a30dac823faecb0

        SHA1

        dc6f6995021ff282656adf2c34fc3c8bcae9ed0f

        SHA256

        eb668ad5d4931d879c1c11c6f71878c96b2a87254a7ee6d65eaf11a74868bd3a

        SHA512

        adb5fbba1ee1b3c6ee72c02f2e42bd0e4344a8212fa80f8f43912a484b00c85ea5e8bc833a2487421ebcf564fec344094c1d5c84cd3804f2f246080c9db72b38

      • memory/3024-1-0x0000000000400000-0x0000000000553000-memory.dmp

        Filesize

        1.3MB

      • memory/3024-17-0x0000000002030000-0x0000000002040000-memory.dmp

        Filesize

        64KB

      • memory/3024-19-0x0000000002030000-0x0000000002040000-memory.dmp

        Filesize

        64KB

      • memory/3024-21-0x0000000000400000-0x0000000000553000-memory.dmp

        Filesize

        1.3MB

      • memory/3024-22-0x0000000002030000-0x0000000002040000-memory.dmp

        Filesize

        64KB

      • memory/3024-23-0x0000000002030000-0x0000000002040000-memory.dmp

        Filesize

        64KB

      • memory/3024-0-0x0000000000400000-0x0000000000553000-memory.dmp

        Filesize

        1.3MB