Analysis

  • max time kernel
    141s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/09/2023, 22:23

General

  • Target

    e5289cd212aa4e108819d82a042238c6fe30a91b3a200078cd48cea5e61194b9.exe

  • Size

    2.3MB

  • MD5

    f10ca1d3522e43228ff239f585615210

  • SHA1

    b67a99c58390d85217ef511e439ced3a88f4cdde

  • SHA256

    e5289cd212aa4e108819d82a042238c6fe30a91b3a200078cd48cea5e61194b9

  • SHA512

    1b6ce208c4c7a44cf408474f47f21ad7be551607ac23020e4d969991a820373c8d86b1bf37e6ff7ad22a036edcef997648363f24d6997bb29ba34176d88da84f

  • SSDEEP

    49152:zAQJOAv+fWLsbe/lG4U2lKeLZrMh7NteW07q4bDg:EQMKUqsbSlG4U2fLZruba+4bDg

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 9 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 8 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 16 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e5289cd212aa4e108819d82a042238c6fe30a91b3a200078cd48cea5e61194b9.exe
    "C:\Users\Admin\AppData\Local\Temp\e5289cd212aa4e108819d82a042238c6fe30a91b3a200078cd48cea5e61194b9.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4956
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
      2⤵
      • Checks computer location settings
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:4916
      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of SetWindowsHookEx
        PID:4072
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
      2⤵
      • Checks computer location settings
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1744
      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of SetWindowsHookEx
        PID:3584
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
      2⤵
      • Checks computer location settings
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:4188
      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of SetWindowsHookEx
        PID:1428
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
      2⤵
      • Checks computer location settings
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:5048
      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of SetWindowsHookEx
        PID:4268
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
      2⤵
      • Checks computer location settings
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:4220
      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
        3⤵
        • Executes dropped EXE
        PID:3816
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
      2⤵
      • Checks computer location settings
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:4228
      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of SetWindowsHookEx
        PID:4596
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
      2⤵
      • Checks computer location settings
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:5052
      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of SetWindowsHookEx
        PID:3212
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
      2⤵
      • Checks computer location settings
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:3000
      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:4548

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

    Filesize

    753B

    MD5

    40a1afd4ad09d723455f457105ae1de2

    SHA1

    911004f07fd9d54a22d5aec587291e67d24f2553

    SHA256

    d046d23913b04d44889bcaf65bc50119360ffc95ccc7b7f4f7503bb0973f8660

    SHA512

    e53aedcdba6586e1c030c740ad3d96c02dba9cfe1836fabb06eaf4fa1c1cd23714e9f869e86a971f32cec64df908d3645130c0db0bb5503fc46ce4ab1f613ccb

  • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

    Filesize

    753B

    MD5

    40a1afd4ad09d723455f457105ae1de2

    SHA1

    911004f07fd9d54a22d5aec587291e67d24f2553

    SHA256

    d046d23913b04d44889bcaf65bc50119360ffc95ccc7b7f4f7503bb0973f8660

    SHA512

    e53aedcdba6586e1c030c740ad3d96c02dba9cfe1836fabb06eaf4fa1c1cd23714e9f869e86a971f32cec64df908d3645130c0db0bb5503fc46ce4ab1f613ccb

  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    2.3MB

    MD5

    2b40347937f23a77279eba17d01b95d9

    SHA1

    15f907835a1a9caf2c95e7b4e426823f2b2b7770

    SHA256

    0a6cca245180a31e64b0188f5942700b871f9297734513d34b305d3b7f969f41

    SHA512

    e8418598c32848675c141ee415ca27a5a136cd0d8d74acf59d534927b9714bf9de416f216f9695c502282e350114dd2a75718a57ca85b432619b60e47486c49e

  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    2.3MB

    MD5

    2b40347937f23a77279eba17d01b95d9

    SHA1

    15f907835a1a9caf2c95e7b4e426823f2b2b7770

    SHA256

    0a6cca245180a31e64b0188f5942700b871f9297734513d34b305d3b7f969f41

    SHA512

    e8418598c32848675c141ee415ca27a5a136cd0d8d74acf59d534927b9714bf9de416f216f9695c502282e350114dd2a75718a57ca85b432619b60e47486c49e

  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    2.3MB

    MD5

    2b40347937f23a77279eba17d01b95d9

    SHA1

    15f907835a1a9caf2c95e7b4e426823f2b2b7770

    SHA256

    0a6cca245180a31e64b0188f5942700b871f9297734513d34b305d3b7f969f41

    SHA512

    e8418598c32848675c141ee415ca27a5a136cd0d8d74acf59d534927b9714bf9de416f216f9695c502282e350114dd2a75718a57ca85b432619b60e47486c49e

  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    2.3MB

    MD5

    2b40347937f23a77279eba17d01b95d9

    SHA1

    15f907835a1a9caf2c95e7b4e426823f2b2b7770

    SHA256

    0a6cca245180a31e64b0188f5942700b871f9297734513d34b305d3b7f969f41

    SHA512

    e8418598c32848675c141ee415ca27a5a136cd0d8d74acf59d534927b9714bf9de416f216f9695c502282e350114dd2a75718a57ca85b432619b60e47486c49e

  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    2.3MB

    MD5

    2b40347937f23a77279eba17d01b95d9

    SHA1

    15f907835a1a9caf2c95e7b4e426823f2b2b7770

    SHA256

    0a6cca245180a31e64b0188f5942700b871f9297734513d34b305d3b7f969f41

    SHA512

    e8418598c32848675c141ee415ca27a5a136cd0d8d74acf59d534927b9714bf9de416f216f9695c502282e350114dd2a75718a57ca85b432619b60e47486c49e

  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    2.3MB

    MD5

    2b40347937f23a77279eba17d01b95d9

    SHA1

    15f907835a1a9caf2c95e7b4e426823f2b2b7770

    SHA256

    0a6cca245180a31e64b0188f5942700b871f9297734513d34b305d3b7f969f41

    SHA512

    e8418598c32848675c141ee415ca27a5a136cd0d8d74acf59d534927b9714bf9de416f216f9695c502282e350114dd2a75718a57ca85b432619b60e47486c49e

  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    2.3MB

    MD5

    2b40347937f23a77279eba17d01b95d9

    SHA1

    15f907835a1a9caf2c95e7b4e426823f2b2b7770

    SHA256

    0a6cca245180a31e64b0188f5942700b871f9297734513d34b305d3b7f969f41

    SHA512

    e8418598c32848675c141ee415ca27a5a136cd0d8d74acf59d534927b9714bf9de416f216f9695c502282e350114dd2a75718a57ca85b432619b60e47486c49e

  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    2.3MB

    MD5

    2b40347937f23a77279eba17d01b95d9

    SHA1

    15f907835a1a9caf2c95e7b4e426823f2b2b7770

    SHA256

    0a6cca245180a31e64b0188f5942700b871f9297734513d34b305d3b7f969f41

    SHA512

    e8418598c32848675c141ee415ca27a5a136cd0d8d74acf59d534927b9714bf9de416f216f9695c502282e350114dd2a75718a57ca85b432619b60e47486c49e

  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    2.3MB

    MD5

    2b40347937f23a77279eba17d01b95d9

    SHA1

    15f907835a1a9caf2c95e7b4e426823f2b2b7770

    SHA256

    0a6cca245180a31e64b0188f5942700b871f9297734513d34b305d3b7f969f41

    SHA512

    e8418598c32848675c141ee415ca27a5a136cd0d8d74acf59d534927b9714bf9de416f216f9695c502282e350114dd2a75718a57ca85b432619b60e47486c49e

  • memory/1428-27-0x0000000000400000-0x0000000000653000-memory.dmp

    Filesize

    2.3MB

  • memory/1428-35-0x0000000000400000-0x0000000000653000-memory.dmp

    Filesize

    2.3MB

  • memory/3212-39-0x0000000000400000-0x0000000000653000-memory.dmp

    Filesize

    2.3MB

  • memory/3584-42-0x0000000000400000-0x0000000000653000-memory.dmp

    Filesize

    2.3MB

  • memory/3816-38-0x0000000000400000-0x0000000000653000-memory.dmp

    Filesize

    2.3MB

  • memory/4072-33-0x0000000000400000-0x0000000000653000-memory.dmp

    Filesize

    2.3MB

  • memory/4072-40-0x0000000000400000-0x0000000000653000-memory.dmp

    Filesize

    2.3MB

  • memory/4268-37-0x0000000000400000-0x0000000000653000-memory.dmp

    Filesize

    2.3MB

  • memory/4548-41-0x0000000000400000-0x0000000000653000-memory.dmp

    Filesize

    2.3MB

  • memory/4548-43-0x0000000000400000-0x0000000000653000-memory.dmp

    Filesize

    2.3MB

  • memory/4596-36-0x0000000000400000-0x0000000000653000-memory.dmp

    Filesize

    2.3MB

  • memory/4956-0-0x0000000000400000-0x0000000000653000-memory.dmp

    Filesize

    2.3MB

  • memory/4956-23-0x0000000000400000-0x0000000000653000-memory.dmp

    Filesize

    2.3MB