Analysis
-
max time kernel
146s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2023, 07:57
Static task
static1
Behavioral task
behavioral1
Sample
b25ebe80092d4a61ef34866a5cb5028a7c3fc91456c23d2e2530784ea6509e01.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
b25ebe80092d4a61ef34866a5cb5028a7c3fc91456c23d2e2530784ea6509e01.exe
Resource
win10v2004-20230915-en
General
-
Target
b25ebe80092d4a61ef34866a5cb5028a7c3fc91456c23d2e2530784ea6509e01.exe
-
Size
1.1MB
-
MD5
798f272603d825380d833c27084ec0e9
-
SHA1
3d14177ec5a7086fb80aebe90a8a22d5a75f9ab2
-
SHA256
b25ebe80092d4a61ef34866a5cb5028a7c3fc91456c23d2e2530784ea6509e01
-
SHA512
f78386b268ca4ebf0f8b061b541e91ee2a1c0f6274f203f0f548934002e3e220eae9d3a94721fae1e2d390614d29940f79dadd74d23f10b0c7673c2fd5c6831d
-
SSDEEP
24576:gRW3N/0f/oAPoRBchI5anfOlAUAi1K6oElG4lBujFAvCyRT:g5ApamAUAQ/lG4lBmFAvZT
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\Control Panel\International\Geo\Nation b25ebe80092d4a61ef34866a5cb5028a7c3fc91456c23d2e2530784ea6509e01.exe Key value queried \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\Control Panel\International\Geo\Nation WScript.exe -
Executes dropped EXE 3 IoCs
pid Process 3604 svchcst.exe 2124 svchcst.exe 5072 svchcst.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000_Classes\Local Settings b25ebe80092d4a61ef34866a5cb5028a7c3fc91456c23d2e2530784ea6509e01.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 232 b25ebe80092d4a61ef34866a5cb5028a7c3fc91456c23d2e2530784ea6509e01.exe 232 b25ebe80092d4a61ef34866a5cb5028a7c3fc91456c23d2e2530784ea6509e01.exe 232 b25ebe80092d4a61ef34866a5cb5028a7c3fc91456c23d2e2530784ea6509e01.exe 232 b25ebe80092d4a61ef34866a5cb5028a7c3fc91456c23d2e2530784ea6509e01.exe 232 b25ebe80092d4a61ef34866a5cb5028a7c3fc91456c23d2e2530784ea6509e01.exe 232 b25ebe80092d4a61ef34866a5cb5028a7c3fc91456c23d2e2530784ea6509e01.exe 3604 svchcst.exe 3604 svchcst.exe 3604 svchcst.exe 3604 svchcst.exe 3604 svchcst.exe 3604 svchcst.exe 3604 svchcst.exe 3604 svchcst.exe 3604 svchcst.exe 3604 svchcst.exe 3604 svchcst.exe 3604 svchcst.exe 3604 svchcst.exe 3604 svchcst.exe 3604 svchcst.exe 3604 svchcst.exe 3604 svchcst.exe 3604 svchcst.exe 3604 svchcst.exe 3604 svchcst.exe 3604 svchcst.exe 3604 svchcst.exe 3604 svchcst.exe 3604 svchcst.exe 3604 svchcst.exe 3604 svchcst.exe 3604 svchcst.exe 3604 svchcst.exe 3604 svchcst.exe 3604 svchcst.exe 3604 svchcst.exe 3604 svchcst.exe 3604 svchcst.exe 3604 svchcst.exe 3604 svchcst.exe 3604 svchcst.exe 3604 svchcst.exe 3604 svchcst.exe 3604 svchcst.exe 3604 svchcst.exe 3604 svchcst.exe 3604 svchcst.exe 3604 svchcst.exe 3604 svchcst.exe 3604 svchcst.exe 3604 svchcst.exe 3604 svchcst.exe 3604 svchcst.exe 3604 svchcst.exe 3604 svchcst.exe 3604 svchcst.exe 3604 svchcst.exe 3604 svchcst.exe 3604 svchcst.exe 3604 svchcst.exe 3604 svchcst.exe 3604 svchcst.exe 3604 svchcst.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 232 b25ebe80092d4a61ef34866a5cb5028a7c3fc91456c23d2e2530784ea6509e01.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 232 b25ebe80092d4a61ef34866a5cb5028a7c3fc91456c23d2e2530784ea6509e01.exe 232 b25ebe80092d4a61ef34866a5cb5028a7c3fc91456c23d2e2530784ea6509e01.exe 3604 svchcst.exe 3604 svchcst.exe 2124 svchcst.exe 2124 svchcst.exe 5072 svchcst.exe 5072 svchcst.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 232 wrote to memory of 5076 232 b25ebe80092d4a61ef34866a5cb5028a7c3fc91456c23d2e2530784ea6509e01.exe 87 PID 232 wrote to memory of 5076 232 b25ebe80092d4a61ef34866a5cb5028a7c3fc91456c23d2e2530784ea6509e01.exe 87 PID 232 wrote to memory of 5076 232 b25ebe80092d4a61ef34866a5cb5028a7c3fc91456c23d2e2530784ea6509e01.exe 87 PID 232 wrote to memory of 3488 232 b25ebe80092d4a61ef34866a5cb5028a7c3fc91456c23d2e2530784ea6509e01.exe 86 PID 232 wrote to memory of 3488 232 b25ebe80092d4a61ef34866a5cb5028a7c3fc91456c23d2e2530784ea6509e01.exe 86 PID 232 wrote to memory of 3488 232 b25ebe80092d4a61ef34866a5cb5028a7c3fc91456c23d2e2530784ea6509e01.exe 86 PID 232 wrote to memory of 2200 232 b25ebe80092d4a61ef34866a5cb5028a7c3fc91456c23d2e2530784ea6509e01.exe 88 PID 232 wrote to memory of 2200 232 b25ebe80092d4a61ef34866a5cb5028a7c3fc91456c23d2e2530784ea6509e01.exe 88 PID 232 wrote to memory of 2200 232 b25ebe80092d4a61ef34866a5cb5028a7c3fc91456c23d2e2530784ea6509e01.exe 88 PID 2200 wrote to memory of 3604 2200 WScript.exe 96 PID 2200 wrote to memory of 3604 2200 WScript.exe 96 PID 2200 wrote to memory of 3604 2200 WScript.exe 96 PID 3488 wrote to memory of 2124 3488 WScript.exe 97 PID 3488 wrote to memory of 2124 3488 WScript.exe 97 PID 3488 wrote to memory of 2124 3488 WScript.exe 97 PID 5076 wrote to memory of 5072 5076 WScript.exe 98 PID 5076 wrote to memory of 5072 5076 WScript.exe 98 PID 5076 wrote to memory of 5072 5076 WScript.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\b25ebe80092d4a61ef34866a5cb5028a7c3fc91456c23d2e2530784ea6509e01.exe"C:\Users\Admin\AppData\Local\Temp\b25ebe80092d4a61ef34866a5cb5028a7c3fc91456c23d2e2530784ea6509e01.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2124
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5072
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3604
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
753B
MD5367cb86615be003a14383eb68f72ce1b
SHA1391f7f4b95eafac9122dddcca35fc5ef1259716b
SHA256b4705afa486fefa5e5bec61ee8cb9bba0baab5ceed9e3bdbce7f6e70b03cad90
SHA5122ec6393baeebf5cd694d90ee7bb230c78c838c436d0a7a8122959a8c4812d37a995143cfe9d45d3417b1fac5f1bf88345893846bba70245ab95259999334f4ff
-
Filesize
753B
MD5367cb86615be003a14383eb68f72ce1b
SHA1391f7f4b95eafac9122dddcca35fc5ef1259716b
SHA256b4705afa486fefa5e5bec61ee8cb9bba0baab5ceed9e3bdbce7f6e70b03cad90
SHA5122ec6393baeebf5cd694d90ee7bb230c78c838c436d0a7a8122959a8c4812d37a995143cfe9d45d3417b1fac5f1bf88345893846bba70245ab95259999334f4ff
-
Filesize
1.1MB
MD5155c1a8699946164b97926a786321b1f
SHA1a177b9512ef143b23cc6344948eb76ae6573a776
SHA25639550a08b7ccc9b96fe13c19859f9b1a5211a755a30065f06fd3fd9ebcbf92c2
SHA51205fa4e0c9cb240a3e5a207fe5f16632a8487401bb0d4175024713c2af8b99128c23548780f175acebbff9bce130f056b6801a733669a8b00cf9a55803d4167b8
-
Filesize
1.1MB
MD5155c1a8699946164b97926a786321b1f
SHA1a177b9512ef143b23cc6344948eb76ae6573a776
SHA25639550a08b7ccc9b96fe13c19859f9b1a5211a755a30065f06fd3fd9ebcbf92c2
SHA51205fa4e0c9cb240a3e5a207fe5f16632a8487401bb0d4175024713c2af8b99128c23548780f175acebbff9bce130f056b6801a733669a8b00cf9a55803d4167b8
-
Filesize
1.1MB
MD5155c1a8699946164b97926a786321b1f
SHA1a177b9512ef143b23cc6344948eb76ae6573a776
SHA25639550a08b7ccc9b96fe13c19859f9b1a5211a755a30065f06fd3fd9ebcbf92c2
SHA51205fa4e0c9cb240a3e5a207fe5f16632a8487401bb0d4175024713c2af8b99128c23548780f175acebbff9bce130f056b6801a733669a8b00cf9a55803d4167b8
-
Filesize
1.1MB
MD5155c1a8699946164b97926a786321b1f
SHA1a177b9512ef143b23cc6344948eb76ae6573a776
SHA25639550a08b7ccc9b96fe13c19859f9b1a5211a755a30065f06fd3fd9ebcbf92c2
SHA51205fa4e0c9cb240a3e5a207fe5f16632a8487401bb0d4175024713c2af8b99128c23548780f175acebbff9bce130f056b6801a733669a8b00cf9a55803d4167b8