Analysis
-
max time kernel
139s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
20-09-2023 18:23
Static task
static1
Behavioral task
behavioral1
Sample
e405443f694fd0fbb7bcab36fcce7c8c1ce5e73fed00ceceabb3c512eb085ff4.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
e405443f694fd0fbb7bcab36fcce7c8c1ce5e73fed00ceceabb3c512eb085ff4.exe
Resource
win10v2004-20230915-en
General
-
Target
e405443f694fd0fbb7bcab36fcce7c8c1ce5e73fed00ceceabb3c512eb085ff4.exe
-
Size
1.1MB
-
MD5
d8a3a1c0a608339845a0c868756c0a4d
-
SHA1
ec92c4e5d7974d52b5e01baf62ca605a03a283ab
-
SHA256
e405443f694fd0fbb7bcab36fcce7c8c1ce5e73fed00ceceabb3c512eb085ff4
-
SHA512
84e1da2a27bc2ec45273e9bbccac62cd87dc821a9ec1bc00398e1969436ad95810a65e8bd19f4c19d79ba7c170c38ae4cbb2cbd2c32bd7b6aa16bf44110b82ad
-
SSDEEP
24576:CH0dl8myX9Bg42QoXFkrzkmmlSgRDko0lG4Z8r7Qfbkiu5QJ:CcaClSFlG4ZM7QzMa
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 7 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation e405443f694fd0fbb7bcab36fcce7c8c1ce5e73fed00ceceabb3c512eb085ff4.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation WScript.exe -
Executes dropped EXE 2 IoCs
pid Process 724 svchcst.exe 936 svchcst.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 7 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000_Classes\Local Settings e405443f694fd0fbb7bcab36fcce7c8c1ce5e73fed00ceceabb3c512eb085ff4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3748 e405443f694fd0fbb7bcab36fcce7c8c1ce5e73fed00ceceabb3c512eb085ff4.exe 3748 e405443f694fd0fbb7bcab36fcce7c8c1ce5e73fed00ceceabb3c512eb085ff4.exe 3748 e405443f694fd0fbb7bcab36fcce7c8c1ce5e73fed00ceceabb3c512eb085ff4.exe 3748 e405443f694fd0fbb7bcab36fcce7c8c1ce5e73fed00ceceabb3c512eb085ff4.exe 3748 e405443f694fd0fbb7bcab36fcce7c8c1ce5e73fed00ceceabb3c512eb085ff4.exe 3748 e405443f694fd0fbb7bcab36fcce7c8c1ce5e73fed00ceceabb3c512eb085ff4.exe 3748 e405443f694fd0fbb7bcab36fcce7c8c1ce5e73fed00ceceabb3c512eb085ff4.exe 3748 e405443f694fd0fbb7bcab36fcce7c8c1ce5e73fed00ceceabb3c512eb085ff4.exe 3748 e405443f694fd0fbb7bcab36fcce7c8c1ce5e73fed00ceceabb3c512eb085ff4.exe 3748 e405443f694fd0fbb7bcab36fcce7c8c1ce5e73fed00ceceabb3c512eb085ff4.exe 3748 e405443f694fd0fbb7bcab36fcce7c8c1ce5e73fed00ceceabb3c512eb085ff4.exe 3748 e405443f694fd0fbb7bcab36fcce7c8c1ce5e73fed00ceceabb3c512eb085ff4.exe 3748 e405443f694fd0fbb7bcab36fcce7c8c1ce5e73fed00ceceabb3c512eb085ff4.exe 3748 e405443f694fd0fbb7bcab36fcce7c8c1ce5e73fed00ceceabb3c512eb085ff4.exe 724 svchcst.exe 724 svchcst.exe 724 svchcst.exe 724 svchcst.exe 724 svchcst.exe 724 svchcst.exe 724 svchcst.exe 724 svchcst.exe 724 svchcst.exe 724 svchcst.exe 724 svchcst.exe 724 svchcst.exe 724 svchcst.exe 724 svchcst.exe 724 svchcst.exe 724 svchcst.exe 724 svchcst.exe 724 svchcst.exe 724 svchcst.exe 724 svchcst.exe 724 svchcst.exe 724 svchcst.exe 724 svchcst.exe 724 svchcst.exe 724 svchcst.exe 724 svchcst.exe 724 svchcst.exe 724 svchcst.exe 724 svchcst.exe 724 svchcst.exe 724 svchcst.exe 724 svchcst.exe 724 svchcst.exe 724 svchcst.exe 724 svchcst.exe 724 svchcst.exe 724 svchcst.exe 724 svchcst.exe 724 svchcst.exe 724 svchcst.exe 724 svchcst.exe 724 svchcst.exe 724 svchcst.exe 724 svchcst.exe 724 svchcst.exe 724 svchcst.exe 724 svchcst.exe 724 svchcst.exe 724 svchcst.exe 724 svchcst.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3748 e405443f694fd0fbb7bcab36fcce7c8c1ce5e73fed00ceceabb3c512eb085ff4.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3748 e405443f694fd0fbb7bcab36fcce7c8c1ce5e73fed00ceceabb3c512eb085ff4.exe 3748 e405443f694fd0fbb7bcab36fcce7c8c1ce5e73fed00ceceabb3c512eb085ff4.exe 724 svchcst.exe 936 svchcst.exe 724 svchcst.exe 936 svchcst.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 3748 wrote to memory of 4412 3748 e405443f694fd0fbb7bcab36fcce7c8c1ce5e73fed00ceceabb3c512eb085ff4.exe 89 PID 3748 wrote to memory of 4412 3748 e405443f694fd0fbb7bcab36fcce7c8c1ce5e73fed00ceceabb3c512eb085ff4.exe 89 PID 3748 wrote to memory of 4412 3748 e405443f694fd0fbb7bcab36fcce7c8c1ce5e73fed00ceceabb3c512eb085ff4.exe 89 PID 3748 wrote to memory of 2964 3748 e405443f694fd0fbb7bcab36fcce7c8c1ce5e73fed00ceceabb3c512eb085ff4.exe 91 PID 3748 wrote to memory of 2964 3748 e405443f694fd0fbb7bcab36fcce7c8c1ce5e73fed00ceceabb3c512eb085ff4.exe 91 PID 3748 wrote to memory of 2964 3748 e405443f694fd0fbb7bcab36fcce7c8c1ce5e73fed00ceceabb3c512eb085ff4.exe 91 PID 3748 wrote to memory of 3160 3748 e405443f694fd0fbb7bcab36fcce7c8c1ce5e73fed00ceceabb3c512eb085ff4.exe 87 PID 3748 wrote to memory of 3160 3748 e405443f694fd0fbb7bcab36fcce7c8c1ce5e73fed00ceceabb3c512eb085ff4.exe 87 PID 3748 wrote to memory of 3160 3748 e405443f694fd0fbb7bcab36fcce7c8c1ce5e73fed00ceceabb3c512eb085ff4.exe 87 PID 3748 wrote to memory of 3504 3748 e405443f694fd0fbb7bcab36fcce7c8c1ce5e73fed00ceceabb3c512eb085ff4.exe 92 PID 3748 wrote to memory of 3504 3748 e405443f694fd0fbb7bcab36fcce7c8c1ce5e73fed00ceceabb3c512eb085ff4.exe 92 PID 3748 wrote to memory of 3504 3748 e405443f694fd0fbb7bcab36fcce7c8c1ce5e73fed00ceceabb3c512eb085ff4.exe 92 PID 3748 wrote to memory of 4520 3748 e405443f694fd0fbb7bcab36fcce7c8c1ce5e73fed00ceceabb3c512eb085ff4.exe 90 PID 3748 wrote to memory of 4520 3748 e405443f694fd0fbb7bcab36fcce7c8c1ce5e73fed00ceceabb3c512eb085ff4.exe 90 PID 3748 wrote to memory of 4520 3748 e405443f694fd0fbb7bcab36fcce7c8c1ce5e73fed00ceceabb3c512eb085ff4.exe 90 PID 3748 wrote to memory of 2704 3748 e405443f694fd0fbb7bcab36fcce7c8c1ce5e73fed00ceceabb3c512eb085ff4.exe 88 PID 3748 wrote to memory of 2704 3748 e405443f694fd0fbb7bcab36fcce7c8c1ce5e73fed00ceceabb3c512eb085ff4.exe 88 PID 3748 wrote to memory of 2704 3748 e405443f694fd0fbb7bcab36fcce7c8c1ce5e73fed00ceceabb3c512eb085ff4.exe 88 PID 4520 wrote to memory of 936 4520 WScript.exe 94 PID 4520 wrote to memory of 936 4520 WScript.exe 94 PID 4520 wrote to memory of 936 4520 WScript.exe 94 PID 2704 wrote to memory of 724 2704 WScript.exe 95 PID 2704 wrote to memory of 724 2704 WScript.exe 95 PID 2704 wrote to memory of 724 2704 WScript.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\e405443f694fd0fbb7bcab36fcce7c8c1ce5e73fed00ceceabb3c512eb085ff4.exe"C:\Users\Admin\AppData\Local\Temp\e405443f694fd0fbb7bcab36fcce7c8c1ce5e73fed00ceceabb3c512eb085ff4.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3748 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- Modifies registry class
PID:3160
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:724
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- Modifies registry class
PID:4412
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:936
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- Modifies registry class
PID:2964
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- Modifies registry class
PID:3504
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
753B
MD5295316c067c229d01b040e4a971420b2
SHA107ea7150f271dc7e63423144bdfaa681a7385c66
SHA25651b3159a6087d5f2ee9dab3268a04d993693182014923614ba975d66a23e5e26
SHA512c76fcfafe3dff8bf3f376272ced6103e3eafac6bc6c0ded21e9983264a58496fadf205926ede1df3b60cc0c35a8c72405796b5ae51ee84f86ebbb4102ff50e7a
-
Filesize
753B
MD5295316c067c229d01b040e4a971420b2
SHA107ea7150f271dc7e63423144bdfaa681a7385c66
SHA25651b3159a6087d5f2ee9dab3268a04d993693182014923614ba975d66a23e5e26
SHA512c76fcfafe3dff8bf3f376272ced6103e3eafac6bc6c0ded21e9983264a58496fadf205926ede1df3b60cc0c35a8c72405796b5ae51ee84f86ebbb4102ff50e7a
-
Filesize
1.1MB
MD53c5c77eaa05b0e641a0dc31a37fe7b0a
SHA10f42577dd1c250bc317b86bd4b67deea97c6baa0
SHA2560aedbf8b9b1ba42d3b00b220a583dbd201b4fddb780b3c757e4b19878278b175
SHA512316e98f70e960b56eddc212c37af91c908ff22cdc20771e80717a28c8bbb23e63b215c65b45f680e740eb2eb7bc33da79f64d56839e75356832a1bad5a369e50
-
Filesize
1.1MB
MD53c5c77eaa05b0e641a0dc31a37fe7b0a
SHA10f42577dd1c250bc317b86bd4b67deea97c6baa0
SHA2560aedbf8b9b1ba42d3b00b220a583dbd201b4fddb780b3c757e4b19878278b175
SHA512316e98f70e960b56eddc212c37af91c908ff22cdc20771e80717a28c8bbb23e63b215c65b45f680e740eb2eb7bc33da79f64d56839e75356832a1bad5a369e50
-
Filesize
1.1MB
MD53c5c77eaa05b0e641a0dc31a37fe7b0a
SHA10f42577dd1c250bc317b86bd4b67deea97c6baa0
SHA2560aedbf8b9b1ba42d3b00b220a583dbd201b4fddb780b3c757e4b19878278b175
SHA512316e98f70e960b56eddc212c37af91c908ff22cdc20771e80717a28c8bbb23e63b215c65b45f680e740eb2eb7bc33da79f64d56839e75356832a1bad5a369e50