Analysis
-
max time kernel
126s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
01-10-2023 10:27
Static task
static1
Behavioral task
behavioral1
Sample
6ca95ecd56408d1e44cb18935578e6d8d7f407e37953c31136f73afa80c063ae.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
6ca95ecd56408d1e44cb18935578e6d8d7f407e37953c31136f73afa80c063ae.exe
Resource
win10v2004-20230915-en
General
-
Target
6ca95ecd56408d1e44cb18935578e6d8d7f407e37953c31136f73afa80c063ae.exe
-
Size
1.1MB
-
MD5
e4984942dc13a6fc681001c5933a3963
-
SHA1
b8c1f6d36cf3887c48faa810561e6ed63ac14893
-
SHA256
6ca95ecd56408d1e44cb18935578e6d8d7f407e37953c31136f73afa80c063ae
-
SHA512
edc6899a9e768f98aeeee3c15fe7d60f37afc584f610e5a63f07f8201411da6c88afae84410639565b9bde73e4fe49791ecf3ad25384deaaecfe0e4f4f19ee1a
-
SSDEEP
24576:gRW3N/0f/oAPoRBchI5anfOlAUAi1K6oElG4lBujFAvCyRh:g5ApamAUAQ/lG4lBmFAvZh
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation 6ca95ecd56408d1e44cb18935578e6d8d7f407e37953c31136f73afa80c063ae.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation WScript.exe -
Executes dropped EXE 3 IoCs
pid Process 4808 svchcst.exe 1824 svchcst.exe 3260 svchcst.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000_Classes\Local Settings 6ca95ecd56408d1e44cb18935578e6d8d7f407e37953c31136f73afa80c063ae.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4820 6ca95ecd56408d1e44cb18935578e6d8d7f407e37953c31136f73afa80c063ae.exe 4820 6ca95ecd56408d1e44cb18935578e6d8d7f407e37953c31136f73afa80c063ae.exe 4820 6ca95ecd56408d1e44cb18935578e6d8d7f407e37953c31136f73afa80c063ae.exe 4820 6ca95ecd56408d1e44cb18935578e6d8d7f407e37953c31136f73afa80c063ae.exe 4820 6ca95ecd56408d1e44cb18935578e6d8d7f407e37953c31136f73afa80c063ae.exe 4820 6ca95ecd56408d1e44cb18935578e6d8d7f407e37953c31136f73afa80c063ae.exe 1824 svchcst.exe 1824 svchcst.exe 1824 svchcst.exe 1824 svchcst.exe 1824 svchcst.exe 1824 svchcst.exe 1824 svchcst.exe 1824 svchcst.exe 1824 svchcst.exe 1824 svchcst.exe 1824 svchcst.exe 1824 svchcst.exe 1824 svchcst.exe 1824 svchcst.exe 1824 svchcst.exe 1824 svchcst.exe 1824 svchcst.exe 1824 svchcst.exe 1824 svchcst.exe 1824 svchcst.exe 1824 svchcst.exe 1824 svchcst.exe 1824 svchcst.exe 1824 svchcst.exe 1824 svchcst.exe 1824 svchcst.exe 1824 svchcst.exe 1824 svchcst.exe 1824 svchcst.exe 1824 svchcst.exe 1824 svchcst.exe 1824 svchcst.exe 1824 svchcst.exe 1824 svchcst.exe 1824 svchcst.exe 1824 svchcst.exe 1824 svchcst.exe 1824 svchcst.exe 1824 svchcst.exe 1824 svchcst.exe 1824 svchcst.exe 1824 svchcst.exe 1824 svchcst.exe 1824 svchcst.exe 1824 svchcst.exe 1824 svchcst.exe 1824 svchcst.exe 1824 svchcst.exe 1824 svchcst.exe 1824 svchcst.exe 1824 svchcst.exe 1824 svchcst.exe 1824 svchcst.exe 1824 svchcst.exe 1824 svchcst.exe 1824 svchcst.exe 1824 svchcst.exe 1824 svchcst.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4820 6ca95ecd56408d1e44cb18935578e6d8d7f407e37953c31136f73afa80c063ae.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4820 6ca95ecd56408d1e44cb18935578e6d8d7f407e37953c31136f73afa80c063ae.exe 4820 6ca95ecd56408d1e44cb18935578e6d8d7f407e37953c31136f73afa80c063ae.exe 1824 svchcst.exe 1824 svchcst.exe 4808 svchcst.exe 4808 svchcst.exe 3260 svchcst.exe 3260 svchcst.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4820 wrote to memory of 3432 4820 6ca95ecd56408d1e44cb18935578e6d8d7f407e37953c31136f73afa80c063ae.exe 83 PID 4820 wrote to memory of 3432 4820 6ca95ecd56408d1e44cb18935578e6d8d7f407e37953c31136f73afa80c063ae.exe 83 PID 4820 wrote to memory of 3432 4820 6ca95ecd56408d1e44cb18935578e6d8d7f407e37953c31136f73afa80c063ae.exe 83 PID 4820 wrote to memory of 4736 4820 6ca95ecd56408d1e44cb18935578e6d8d7f407e37953c31136f73afa80c063ae.exe 82 PID 4820 wrote to memory of 4736 4820 6ca95ecd56408d1e44cb18935578e6d8d7f407e37953c31136f73afa80c063ae.exe 82 PID 4820 wrote to memory of 4736 4820 6ca95ecd56408d1e44cb18935578e6d8d7f407e37953c31136f73afa80c063ae.exe 82 PID 4820 wrote to memory of 3624 4820 6ca95ecd56408d1e44cb18935578e6d8d7f407e37953c31136f73afa80c063ae.exe 84 PID 4820 wrote to memory of 3624 4820 6ca95ecd56408d1e44cb18935578e6d8d7f407e37953c31136f73afa80c063ae.exe 84 PID 4820 wrote to memory of 3624 4820 6ca95ecd56408d1e44cb18935578e6d8d7f407e37953c31136f73afa80c063ae.exe 84 PID 3432 wrote to memory of 4808 3432 WScript.exe 93 PID 3432 wrote to memory of 4808 3432 WScript.exe 93 PID 3432 wrote to memory of 4808 3432 WScript.exe 93 PID 3624 wrote to memory of 1824 3624 WScript.exe 92 PID 3624 wrote to memory of 1824 3624 WScript.exe 92 PID 3624 wrote to memory of 1824 3624 WScript.exe 92 PID 4736 wrote to memory of 3260 4736 WScript.exe 94 PID 4736 wrote to memory of 3260 4736 WScript.exe 94 PID 4736 wrote to memory of 3260 4736 WScript.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\6ca95ecd56408d1e44cb18935578e6d8d7f407e37953c31136f73afa80c063ae.exe"C:\Users\Admin\AppData\Local\Temp\6ca95ecd56408d1e44cb18935578e6d8d7f407e37953c31136f73afa80c063ae.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3260
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4808
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1824
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
753B
MD590686ca866c80493bb824b4c442e931c
SHA1a1613bc0406c93bc566b39d92709393bdbc182ac
SHA256c2502f1518b3f2f31646ac97c8d6aca8aa839857896d98a6419b66dc91113c91
SHA5124fbc41cfdf88e67466756b183a195a667660a78254c83fc2493c8a94f799ea7ca777b775bba367d01fa76febe0be624873f49890e9269a811d584acdc1cd4fb9
-
Filesize
753B
MD590686ca866c80493bb824b4c442e931c
SHA1a1613bc0406c93bc566b39d92709393bdbc182ac
SHA256c2502f1518b3f2f31646ac97c8d6aca8aa839857896d98a6419b66dc91113c91
SHA5124fbc41cfdf88e67466756b183a195a667660a78254c83fc2493c8a94f799ea7ca777b775bba367d01fa76febe0be624873f49890e9269a811d584acdc1cd4fb9
-
Filesize
1.1MB
MD54489c0c9db83a68037b8437093598e1a
SHA16a52bac340741ac014d7d94bee6fd564d43fab8f
SHA25610d4966a50b3aa0d023f7693369ea0816d58e444d2121f7c1c24960eca1772bb
SHA5121aa8387bcb5ceb95c454f210db7bc5542213fe975d9c4ef9947b450d767919ecbbe2a17a73620a122213f75519852e142ee2a8d9ccae8270230bcaf0f535eb5c
-
Filesize
1.1MB
MD54489c0c9db83a68037b8437093598e1a
SHA16a52bac340741ac014d7d94bee6fd564d43fab8f
SHA25610d4966a50b3aa0d023f7693369ea0816d58e444d2121f7c1c24960eca1772bb
SHA5121aa8387bcb5ceb95c454f210db7bc5542213fe975d9c4ef9947b450d767919ecbbe2a17a73620a122213f75519852e142ee2a8d9ccae8270230bcaf0f535eb5c
-
Filesize
1.1MB
MD54489c0c9db83a68037b8437093598e1a
SHA16a52bac340741ac014d7d94bee6fd564d43fab8f
SHA25610d4966a50b3aa0d023f7693369ea0816d58e444d2121f7c1c24960eca1772bb
SHA5121aa8387bcb5ceb95c454f210db7bc5542213fe975d9c4ef9947b450d767919ecbbe2a17a73620a122213f75519852e142ee2a8d9ccae8270230bcaf0f535eb5c
-
Filesize
1.1MB
MD54489c0c9db83a68037b8437093598e1a
SHA16a52bac340741ac014d7d94bee6fd564d43fab8f
SHA25610d4966a50b3aa0d023f7693369ea0816d58e444d2121f7c1c24960eca1772bb
SHA5121aa8387bcb5ceb95c454f210db7bc5542213fe975d9c4ef9947b450d767919ecbbe2a17a73620a122213f75519852e142ee2a8d9ccae8270230bcaf0f535eb5c