Analysis

  • max time kernel
    122s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    20-09-2023 18:23

General

  • Target

    e405443f694fd0fbb7bcab36fcce7c8c1ce5e73fed00ceceabb3c512eb085ff4.exe

  • Size

    1.1MB

  • MD5

    d8a3a1c0a608339845a0c868756c0a4d

  • SHA1

    ec92c4e5d7974d52b5e01baf62ca605a03a283ab

  • SHA256

    e405443f694fd0fbb7bcab36fcce7c8c1ce5e73fed00ceceabb3c512eb085ff4

  • SHA512

    84e1da2a27bc2ec45273e9bbccac62cd87dc821a9ec1bc00398e1969436ad95810a65e8bd19f4c19d79ba7c170c38ae4cbb2cbd2c32bd7b6aa16bf44110b82ad

  • SSDEEP

    24576:CH0dl8myX9Bg42QoXFkrzkmmlSgRDko0lG4Z8r7Qfbkiu5QJ:CcaClSFlG4ZM7QzMa

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e405443f694fd0fbb7bcab36fcce7c8c1ce5e73fed00ceceabb3c512eb085ff4.exe
    "C:\Users\Admin\AppData\Local\Temp\e405443f694fd0fbb7bcab36fcce7c8c1ce5e73fed00ceceabb3c512eb085ff4.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2140
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1684
      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2400
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2680
      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
        3⤵
        • Deletes itself
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:2636
      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2500
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
          4⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:848
          • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2152
            • C:\Windows\SysWOW64\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
              6⤵
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:1864
              • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:2824
            • C:\Windows\SysWOW64\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
              6⤵
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:2800
              • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:1396

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Config.ini

    Filesize

    92B

    MD5

    67b9b3e2ded7086f393ebbc36c5e7bca

    SHA1

    e6299d0450b9a92a18cc23b5704a2b475652c790

    SHA256

    44063c266686263f14cd2a83fee124fb3e61a9171a6aab69709464f49511011d

    SHA512

    826fbc9481f46b1ae3db828a665c55c349023caf563e6e8c17321f5f3af3e4c3914955db6f0eebfc6defe561315435d47310b4d0499ab9c2c85bb61264dedc09

  • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

    Filesize

    753B

    MD5

    6bd96db5b8f541fac51e5ed620d1bc5c

    SHA1

    7b40e075dcd7a25d12fd8eea40bc7b5096b5ddfd

    SHA256

    568d5d172c63c73a1349b9e0e6aee6f2da43d7e48258e49391e5fd856f76020d

    SHA512

    1ab67c555c68ca4400ea0af953e9756e6ae800802e91329764e483f0e16596bcea1e14188f81bb07fbed1cb84226220899a1a8394528febf5fdc9a93d01ffee7

  • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

    Filesize

    753B

    MD5

    6bd96db5b8f541fac51e5ed620d1bc5c

    SHA1

    7b40e075dcd7a25d12fd8eea40bc7b5096b5ddfd

    SHA256

    568d5d172c63c73a1349b9e0e6aee6f2da43d7e48258e49391e5fd856f76020d

    SHA512

    1ab67c555c68ca4400ea0af953e9756e6ae800802e91329764e483f0e16596bcea1e14188f81bb07fbed1cb84226220899a1a8394528febf5fdc9a93d01ffee7

  • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

    Filesize

    696B

    MD5

    5ba8c208c5700f7f25c2e24e00d50ac8

    SHA1

    9838a0ab093ed94bc85a80b1feee14b68e4df8d1

    SHA256

    213371c33e19f6f9e28f089e3206fe50c39b190548b0500f7ba8aff869a68cd6

    SHA512

    065e45ebe4197cdf7e13b799928dfb29e17d4a1741e3e103000b147288b34f16300b72874ec85aefa2c04cc939df115a9fb383d5c95982c1371e75605d1a9b17

  • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

    Filesize

    696B

    MD5

    51b2348c37bbedcb127fa176820f5ea2

    SHA1

    6e70ca09179127890e64c4ffa345b2af573c39fa

    SHA256

    7b37f5580068bfba5583d762d9b64c8ee6468a9e064547f230757c4be595bd02

    SHA512

    0f9755ae0408b0dd6e1279bfa8c5dfbe63b3775a81a3c5b342c5e56e7521d292b0c4e94053e6fa0c3da233f3af60aae2dc28749f991ea81fd9bf2627698a343e

  • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

    Filesize

    696B

    MD5

    51b2348c37bbedcb127fa176820f5ea2

    SHA1

    6e70ca09179127890e64c4ffa345b2af573c39fa

    SHA256

    7b37f5580068bfba5583d762d9b64c8ee6468a9e064547f230757c4be595bd02

    SHA512

    0f9755ae0408b0dd6e1279bfa8c5dfbe63b3775a81a3c5b342c5e56e7521d292b0c4e94053e6fa0c3da233f3af60aae2dc28749f991ea81fd9bf2627698a343e

  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    1.1MB

    MD5

    c262d0d74848291afbd019a8661701d7

    SHA1

    85439d0212828ba02deadbbc1d52c97137b6c1f5

    SHA256

    37ae6ccd1bdcaf09bad0d48f11ea44d1e15378b30ee33dadd60f79917f17a2f9

    SHA512

    fb755af93a26b829e3bf5fbb7000dd94e65bc9100be7063a33890a97eb93f02c72fb0cc53838fc1f3bb92f9a68f5c1820669f405080bccaf7012a21b7fef3eb1

  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    1.1MB

    MD5

    c262d0d74848291afbd019a8661701d7

    SHA1

    85439d0212828ba02deadbbc1d52c97137b6c1f5

    SHA256

    37ae6ccd1bdcaf09bad0d48f11ea44d1e15378b30ee33dadd60f79917f17a2f9

    SHA512

    fb755af93a26b829e3bf5fbb7000dd94e65bc9100be7063a33890a97eb93f02c72fb0cc53838fc1f3bb92f9a68f5c1820669f405080bccaf7012a21b7fef3eb1

  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    1.1MB

    MD5

    48814bfb3384fa92fa77874fa742422e

    SHA1

    13d69ab48b49dc9afd9ee68385cdfa811be144a2

    SHA256

    9e472612584387eb219fc41eb60fa1535ce2596df8f169fbf4e9ee8d8b0a57e0

    SHA512

    e13406788a6f890c37fae0c45cbb14f744c9d466298a63d9cba6d7e7e4c4a09221b3d1c5cca56430fd577cbe94dc5c7afb2b9e4858e28ab9974a276d6bf478e9

  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    1.1MB

    MD5

    48814bfb3384fa92fa77874fa742422e

    SHA1

    13d69ab48b49dc9afd9ee68385cdfa811be144a2

    SHA256

    9e472612584387eb219fc41eb60fa1535ce2596df8f169fbf4e9ee8d8b0a57e0

    SHA512

    e13406788a6f890c37fae0c45cbb14f744c9d466298a63d9cba6d7e7e4c4a09221b3d1c5cca56430fd577cbe94dc5c7afb2b9e4858e28ab9974a276d6bf478e9

  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    1.1MB

    MD5

    48814bfb3384fa92fa77874fa742422e

    SHA1

    13d69ab48b49dc9afd9ee68385cdfa811be144a2

    SHA256

    9e472612584387eb219fc41eb60fa1535ce2596df8f169fbf4e9ee8d8b0a57e0

    SHA512

    e13406788a6f890c37fae0c45cbb14f744c9d466298a63d9cba6d7e7e4c4a09221b3d1c5cca56430fd577cbe94dc5c7afb2b9e4858e28ab9974a276d6bf478e9

  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    1.1MB

    MD5

    48814bfb3384fa92fa77874fa742422e

    SHA1

    13d69ab48b49dc9afd9ee68385cdfa811be144a2

    SHA256

    9e472612584387eb219fc41eb60fa1535ce2596df8f169fbf4e9ee8d8b0a57e0

    SHA512

    e13406788a6f890c37fae0c45cbb14f744c9d466298a63d9cba6d7e7e4c4a09221b3d1c5cca56430fd577cbe94dc5c7afb2b9e4858e28ab9974a276d6bf478e9

  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    1.1MB

    MD5

    6ef28740212a86ebc61926dc8933bf4c

    SHA1

    e63aa3aa149adfe6aefb3acb752cd96aa77bb752

    SHA256

    d10787fbe6c511c55dcf06a91072812d257d4b65022a862ba5e590269a216579

    SHA512

    e12689c3cb4ecc8baf69ea8b9be9be9d44cbba2850aa93fa9be53d0a38974fad8e1d958af5724d86487a8e60d0aa5d6212599daf92870dbb59b0e5756423fac3

  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    1.1MB

    MD5

    6ef28740212a86ebc61926dc8933bf4c

    SHA1

    e63aa3aa149adfe6aefb3acb752cd96aa77bb752

    SHA256

    d10787fbe6c511c55dcf06a91072812d257d4b65022a862ba5e590269a216579

    SHA512

    e12689c3cb4ecc8baf69ea8b9be9be9d44cbba2850aa93fa9be53d0a38974fad8e1d958af5724d86487a8e60d0aa5d6212599daf92870dbb59b0e5756423fac3

  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    1.1MB

    MD5

    6ef28740212a86ebc61926dc8933bf4c

    SHA1

    e63aa3aa149adfe6aefb3acb752cd96aa77bb752

    SHA256

    d10787fbe6c511c55dcf06a91072812d257d4b65022a862ba5e590269a216579

    SHA512

    e12689c3cb4ecc8baf69ea8b9be9be9d44cbba2850aa93fa9be53d0a38974fad8e1d958af5724d86487a8e60d0aa5d6212599daf92870dbb59b0e5756423fac3

  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    1.1MB

    MD5

    6ef28740212a86ebc61926dc8933bf4c

    SHA1

    e63aa3aa149adfe6aefb3acb752cd96aa77bb752

    SHA256

    d10787fbe6c511c55dcf06a91072812d257d4b65022a862ba5e590269a216579

    SHA512

    e12689c3cb4ecc8baf69ea8b9be9be9d44cbba2850aa93fa9be53d0a38974fad8e1d958af5724d86487a8e60d0aa5d6212599daf92870dbb59b0e5756423fac3

  • \Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    1.1MB

    MD5

    c262d0d74848291afbd019a8661701d7

    SHA1

    85439d0212828ba02deadbbc1d52c97137b6c1f5

    SHA256

    37ae6ccd1bdcaf09bad0d48f11ea44d1e15378b30ee33dadd60f79917f17a2f9

    SHA512

    fb755af93a26b829e3bf5fbb7000dd94e65bc9100be7063a33890a97eb93f02c72fb0cc53838fc1f3bb92f9a68f5c1820669f405080bccaf7012a21b7fef3eb1

  • \Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    1.1MB

    MD5

    c262d0d74848291afbd019a8661701d7

    SHA1

    85439d0212828ba02deadbbc1d52c97137b6c1f5

    SHA256

    37ae6ccd1bdcaf09bad0d48f11ea44d1e15378b30ee33dadd60f79917f17a2f9

    SHA512

    fb755af93a26b829e3bf5fbb7000dd94e65bc9100be7063a33890a97eb93f02c72fb0cc53838fc1f3bb92f9a68f5c1820669f405080bccaf7012a21b7fef3eb1

  • \Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    1.1MB

    MD5

    48814bfb3384fa92fa77874fa742422e

    SHA1

    13d69ab48b49dc9afd9ee68385cdfa811be144a2

    SHA256

    9e472612584387eb219fc41eb60fa1535ce2596df8f169fbf4e9ee8d8b0a57e0

    SHA512

    e13406788a6f890c37fae0c45cbb14f744c9d466298a63d9cba6d7e7e4c4a09221b3d1c5cca56430fd577cbe94dc5c7afb2b9e4858e28ab9974a276d6bf478e9

  • \Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    1.1MB

    MD5

    48814bfb3384fa92fa77874fa742422e

    SHA1

    13d69ab48b49dc9afd9ee68385cdfa811be144a2

    SHA256

    9e472612584387eb219fc41eb60fa1535ce2596df8f169fbf4e9ee8d8b0a57e0

    SHA512

    e13406788a6f890c37fae0c45cbb14f744c9d466298a63d9cba6d7e7e4c4a09221b3d1c5cca56430fd577cbe94dc5c7afb2b9e4858e28ab9974a276d6bf478e9

  • \Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    1.1MB

    MD5

    48814bfb3384fa92fa77874fa742422e

    SHA1

    13d69ab48b49dc9afd9ee68385cdfa811be144a2

    SHA256

    9e472612584387eb219fc41eb60fa1535ce2596df8f169fbf4e9ee8d8b0a57e0

    SHA512

    e13406788a6f890c37fae0c45cbb14f744c9d466298a63d9cba6d7e7e4c4a09221b3d1c5cca56430fd577cbe94dc5c7afb2b9e4858e28ab9974a276d6bf478e9

  • \Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    1.1MB

    MD5

    48814bfb3384fa92fa77874fa742422e

    SHA1

    13d69ab48b49dc9afd9ee68385cdfa811be144a2

    SHA256

    9e472612584387eb219fc41eb60fa1535ce2596df8f169fbf4e9ee8d8b0a57e0

    SHA512

    e13406788a6f890c37fae0c45cbb14f744c9d466298a63d9cba6d7e7e4c4a09221b3d1c5cca56430fd577cbe94dc5c7afb2b9e4858e28ab9974a276d6bf478e9

  • \Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    1.1MB

    MD5

    6ef28740212a86ebc61926dc8933bf4c

    SHA1

    e63aa3aa149adfe6aefb3acb752cd96aa77bb752

    SHA256

    d10787fbe6c511c55dcf06a91072812d257d4b65022a862ba5e590269a216579

    SHA512

    e12689c3cb4ecc8baf69ea8b9be9be9d44cbba2850aa93fa9be53d0a38974fad8e1d958af5724d86487a8e60d0aa5d6212599daf92870dbb59b0e5756423fac3

  • \Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    1.1MB

    MD5

    6ef28740212a86ebc61926dc8933bf4c

    SHA1

    e63aa3aa149adfe6aefb3acb752cd96aa77bb752

    SHA256

    d10787fbe6c511c55dcf06a91072812d257d4b65022a862ba5e590269a216579

    SHA512

    e12689c3cb4ecc8baf69ea8b9be9be9d44cbba2850aa93fa9be53d0a38974fad8e1d958af5724d86487a8e60d0aa5d6212599daf92870dbb59b0e5756423fac3

  • \Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    1.1MB

    MD5

    6ef28740212a86ebc61926dc8933bf4c

    SHA1

    e63aa3aa149adfe6aefb3acb752cd96aa77bb752

    SHA256

    d10787fbe6c511c55dcf06a91072812d257d4b65022a862ba5e590269a216579

    SHA512

    e12689c3cb4ecc8baf69ea8b9be9be9d44cbba2850aa93fa9be53d0a38974fad8e1d958af5724d86487a8e60d0aa5d6212599daf92870dbb59b0e5756423fac3

  • \Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    1.1MB

    MD5

    6ef28740212a86ebc61926dc8933bf4c

    SHA1

    e63aa3aa149adfe6aefb3acb752cd96aa77bb752

    SHA256

    d10787fbe6c511c55dcf06a91072812d257d4b65022a862ba5e590269a216579

    SHA512

    e12689c3cb4ecc8baf69ea8b9be9be9d44cbba2850aa93fa9be53d0a38974fad8e1d958af5724d86487a8e60d0aa5d6212599daf92870dbb59b0e5756423fac3

  • memory/2152-35-0x00000000020D0000-0x00000000020F7000-memory.dmp

    Filesize

    156KB