Analysis

  • max time kernel
    139s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-09-2023 18:23

General

  • Target

    e405443f694fd0fbb7bcab36fcce7c8c1ce5e73fed00ceceabb3c512eb085ff4.exe

  • Size

    1.1MB

  • MD5

    d8a3a1c0a608339845a0c868756c0a4d

  • SHA1

    ec92c4e5d7974d52b5e01baf62ca605a03a283ab

  • SHA256

    e405443f694fd0fbb7bcab36fcce7c8c1ce5e73fed00ceceabb3c512eb085ff4

  • SHA512

    84e1da2a27bc2ec45273e9bbccac62cd87dc821a9ec1bc00398e1969436ad95810a65e8bd19f4c19d79ba7c170c38ae4cbb2cbd2c32bd7b6aa16bf44110b82ad

  • SSDEEP

    24576:CH0dl8myX9Bg42QoXFkrzkmmlSgRDko0lG4Z8r7Qfbkiu5QJ:CcaClSFlG4ZM7QzMa

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 7 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e405443f694fd0fbb7bcab36fcce7c8c1ce5e73fed00ceceabb3c512eb085ff4.exe
    "C:\Users\Admin\AppData\Local\Temp\e405443f694fd0fbb7bcab36fcce7c8c1ce5e73fed00ceceabb3c512eb085ff4.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3748
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
      2⤵
      • Checks computer location settings
      • Modifies registry class
      PID:3160
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
      2⤵
      • Checks computer location settings
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2704
      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:724
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
      2⤵
      • Checks computer location settings
      • Modifies registry class
      PID:4412
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
      2⤵
      • Checks computer location settings
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:4520
      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:936
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
      2⤵
      • Checks computer location settings
      • Modifies registry class
      PID:2964
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
      2⤵
      • Checks computer location settings
      • Modifies registry class
      PID:3504

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

    Filesize

    753B

    MD5

    295316c067c229d01b040e4a971420b2

    SHA1

    07ea7150f271dc7e63423144bdfaa681a7385c66

    SHA256

    51b3159a6087d5f2ee9dab3268a04d993693182014923614ba975d66a23e5e26

    SHA512

    c76fcfafe3dff8bf3f376272ced6103e3eafac6bc6c0ded21e9983264a58496fadf205926ede1df3b60cc0c35a8c72405796b5ae51ee84f86ebbb4102ff50e7a

  • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

    Filesize

    753B

    MD5

    295316c067c229d01b040e4a971420b2

    SHA1

    07ea7150f271dc7e63423144bdfaa681a7385c66

    SHA256

    51b3159a6087d5f2ee9dab3268a04d993693182014923614ba975d66a23e5e26

    SHA512

    c76fcfafe3dff8bf3f376272ced6103e3eafac6bc6c0ded21e9983264a58496fadf205926ede1df3b60cc0c35a8c72405796b5ae51ee84f86ebbb4102ff50e7a

  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    1.1MB

    MD5

    3c5c77eaa05b0e641a0dc31a37fe7b0a

    SHA1

    0f42577dd1c250bc317b86bd4b67deea97c6baa0

    SHA256

    0aedbf8b9b1ba42d3b00b220a583dbd201b4fddb780b3c757e4b19878278b175

    SHA512

    316e98f70e960b56eddc212c37af91c908ff22cdc20771e80717a28c8bbb23e63b215c65b45f680e740eb2eb7bc33da79f64d56839e75356832a1bad5a369e50

  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    1.1MB

    MD5

    3c5c77eaa05b0e641a0dc31a37fe7b0a

    SHA1

    0f42577dd1c250bc317b86bd4b67deea97c6baa0

    SHA256

    0aedbf8b9b1ba42d3b00b220a583dbd201b4fddb780b3c757e4b19878278b175

    SHA512

    316e98f70e960b56eddc212c37af91c908ff22cdc20771e80717a28c8bbb23e63b215c65b45f680e740eb2eb7bc33da79f64d56839e75356832a1bad5a369e50

  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    1.1MB

    MD5

    3c5c77eaa05b0e641a0dc31a37fe7b0a

    SHA1

    0f42577dd1c250bc317b86bd4b67deea97c6baa0

    SHA256

    0aedbf8b9b1ba42d3b00b220a583dbd201b4fddb780b3c757e4b19878278b175

    SHA512

    316e98f70e960b56eddc212c37af91c908ff22cdc20771e80717a28c8bbb23e63b215c65b45f680e740eb2eb7bc33da79f64d56839e75356832a1bad5a369e50