Analysis
-
max time kernel
169s -
max time network
188s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
10-10-2023 22:48
Static task
static1
Behavioral task
behavioral1
Sample
18f3b68478552699429c958a40157e92e24b698a1fdef6d3fb8fdd77968a522a.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
18f3b68478552699429c958a40157e92e24b698a1fdef6d3fb8fdd77968a522a.exe
Resource
win10v2004-20230915-en
General
-
Target
18f3b68478552699429c958a40157e92e24b698a1fdef6d3fb8fdd77968a522a.exe
-
Size
1.9MB
-
MD5
eb3f54ca37020842ae8fd84743b7503a
-
SHA1
02d4feaccf1224ab54993ab8cb258caf1e5635ad
-
SHA256
18f3b68478552699429c958a40157e92e24b698a1fdef6d3fb8fdd77968a522a
-
SHA512
0c3770f526bf0418c11db903a3b815277d585b9c7b78ad097485eb1297ed58c050a8a4b073ad327778939fda578592629002122960a020b20fd970a14bf1bfce
-
SSDEEP
49152:AN7pTHvqqv6axnlG4/cY9ACzRob9JH/QQOFom:C9bTv6axnlG4/cY9cHxg
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\Control Panel\International\Geo\Nation 18f3b68478552699429c958a40157e92e24b698a1fdef6d3fb8fdd77968a522a.exe Key value queried \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\Control Panel\International\Geo\Nation WScript.exe -
Executes dropped EXE 3 IoCs
pid Process 3512 svchcst.exe 2832 svchcst.exe 2024 svchcst.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\Local Settings 18f3b68478552699429c958a40157e92e24b698a1fdef6d3fb8fdd77968a522a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4292 18f3b68478552699429c958a40157e92e24b698a1fdef6d3fb8fdd77968a522a.exe 4292 18f3b68478552699429c958a40157e92e24b698a1fdef6d3fb8fdd77968a522a.exe 4292 18f3b68478552699429c958a40157e92e24b698a1fdef6d3fb8fdd77968a522a.exe 4292 18f3b68478552699429c958a40157e92e24b698a1fdef6d3fb8fdd77968a522a.exe 4292 18f3b68478552699429c958a40157e92e24b698a1fdef6d3fb8fdd77968a522a.exe 4292 18f3b68478552699429c958a40157e92e24b698a1fdef6d3fb8fdd77968a522a.exe 3512 svchcst.exe 3512 svchcst.exe 3512 svchcst.exe 3512 svchcst.exe 3512 svchcst.exe 3512 svchcst.exe 3512 svchcst.exe 3512 svchcst.exe 3512 svchcst.exe 3512 svchcst.exe 3512 svchcst.exe 3512 svchcst.exe 3512 svchcst.exe 3512 svchcst.exe 3512 svchcst.exe 3512 svchcst.exe 3512 svchcst.exe 3512 svchcst.exe 3512 svchcst.exe 3512 svchcst.exe 3512 svchcst.exe 3512 svchcst.exe 3512 svchcst.exe 3512 svchcst.exe 3512 svchcst.exe 3512 svchcst.exe 3512 svchcst.exe 3512 svchcst.exe 3512 svchcst.exe 3512 svchcst.exe 3512 svchcst.exe 3512 svchcst.exe 3512 svchcst.exe 3512 svchcst.exe 3512 svchcst.exe 3512 svchcst.exe 3512 svchcst.exe 3512 svchcst.exe 3512 svchcst.exe 3512 svchcst.exe 3512 svchcst.exe 3512 svchcst.exe 3512 svchcst.exe 3512 svchcst.exe 3512 svchcst.exe 3512 svchcst.exe 3512 svchcst.exe 3512 svchcst.exe 3512 svchcst.exe 3512 svchcst.exe 3512 svchcst.exe 3512 svchcst.exe 3512 svchcst.exe 3512 svchcst.exe 3512 svchcst.exe 3512 svchcst.exe 3512 svchcst.exe 3512 svchcst.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4292 18f3b68478552699429c958a40157e92e24b698a1fdef6d3fb8fdd77968a522a.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4292 18f3b68478552699429c958a40157e92e24b698a1fdef6d3fb8fdd77968a522a.exe 4292 18f3b68478552699429c958a40157e92e24b698a1fdef6d3fb8fdd77968a522a.exe 3512 svchcst.exe 3512 svchcst.exe 2832 svchcst.exe 2832 svchcst.exe 2024 svchcst.exe 2024 svchcst.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4292 wrote to memory of 2328 4292 18f3b68478552699429c958a40157e92e24b698a1fdef6d3fb8fdd77968a522a.exe 88 PID 4292 wrote to memory of 2328 4292 18f3b68478552699429c958a40157e92e24b698a1fdef6d3fb8fdd77968a522a.exe 88 PID 4292 wrote to memory of 2328 4292 18f3b68478552699429c958a40157e92e24b698a1fdef6d3fb8fdd77968a522a.exe 88 PID 4292 wrote to memory of 1224 4292 18f3b68478552699429c958a40157e92e24b698a1fdef6d3fb8fdd77968a522a.exe 87 PID 4292 wrote to memory of 1224 4292 18f3b68478552699429c958a40157e92e24b698a1fdef6d3fb8fdd77968a522a.exe 87 PID 4292 wrote to memory of 1224 4292 18f3b68478552699429c958a40157e92e24b698a1fdef6d3fb8fdd77968a522a.exe 87 PID 4292 wrote to memory of 3460 4292 18f3b68478552699429c958a40157e92e24b698a1fdef6d3fb8fdd77968a522a.exe 89 PID 4292 wrote to memory of 3460 4292 18f3b68478552699429c958a40157e92e24b698a1fdef6d3fb8fdd77968a522a.exe 89 PID 4292 wrote to memory of 3460 4292 18f3b68478552699429c958a40157e92e24b698a1fdef6d3fb8fdd77968a522a.exe 89 PID 3460 wrote to memory of 3512 3460 WScript.exe 91 PID 3460 wrote to memory of 3512 3460 WScript.exe 91 PID 3460 wrote to memory of 3512 3460 WScript.exe 91 PID 1224 wrote to memory of 2832 1224 WScript.exe 92 PID 1224 wrote to memory of 2832 1224 WScript.exe 92 PID 1224 wrote to memory of 2832 1224 WScript.exe 92 PID 2328 wrote to memory of 2024 2328 WScript.exe 93 PID 2328 wrote to memory of 2024 2328 WScript.exe 93 PID 2328 wrote to memory of 2024 2328 WScript.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\18f3b68478552699429c958a40157e92e24b698a1fdef6d3fb8fdd77968a522a.exe"C:\Users\Admin\AppData\Local\Temp\18f3b68478552699429c958a40157e92e24b698a1fdef6d3fb8fdd77968a522a.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2832
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2024
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3512
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
753B
MD5c543371d4a6acf9f5050050639f1eeaf
SHA1c115f8d5575926ba70be33140be7503fa25056ef
SHA256d638e67582bdadbda17b9db48158a75e7b3d4c5df4b8642de9252c3c6ea212e4
SHA5122b1e2e97b7c86d8000ab7a339449009d949897779000983d8bff24e9161354c58c9cff1b9fdc32bee406457dafdfea1105381259e7f5f83bcd2fe1d2c825a254
-
Filesize
753B
MD5c543371d4a6acf9f5050050639f1eeaf
SHA1c115f8d5575926ba70be33140be7503fa25056ef
SHA256d638e67582bdadbda17b9db48158a75e7b3d4c5df4b8642de9252c3c6ea212e4
SHA5122b1e2e97b7c86d8000ab7a339449009d949897779000983d8bff24e9161354c58c9cff1b9fdc32bee406457dafdfea1105381259e7f5f83bcd2fe1d2c825a254
-
Filesize
1.9MB
MD5ce8477ede0a02ff93aa093b91f3e1220
SHA1a930b2ee782a8ab1077a587bac988879cdddbb4b
SHA2567713f67dacb77cbaf66a18752d5a0f1c187e2b54efb8024ef43883406be404c2
SHA512b43274ff744c4a274293f73fdc464f155020569f680fb2b264e05e26255faf244ce4cd0b74eaa094338c65bba0a9192b2bc70675f66e55e03b4dff0726fcb4fc
-
Filesize
1.9MB
MD5ce8477ede0a02ff93aa093b91f3e1220
SHA1a930b2ee782a8ab1077a587bac988879cdddbb4b
SHA2567713f67dacb77cbaf66a18752d5a0f1c187e2b54efb8024ef43883406be404c2
SHA512b43274ff744c4a274293f73fdc464f155020569f680fb2b264e05e26255faf244ce4cd0b74eaa094338c65bba0a9192b2bc70675f66e55e03b4dff0726fcb4fc
-
Filesize
1.9MB
MD5ce8477ede0a02ff93aa093b91f3e1220
SHA1a930b2ee782a8ab1077a587bac988879cdddbb4b
SHA2567713f67dacb77cbaf66a18752d5a0f1c187e2b54efb8024ef43883406be404c2
SHA512b43274ff744c4a274293f73fdc464f155020569f680fb2b264e05e26255faf244ce4cd0b74eaa094338c65bba0a9192b2bc70675f66e55e03b4dff0726fcb4fc
-
Filesize
1.9MB
MD5ce8477ede0a02ff93aa093b91f3e1220
SHA1a930b2ee782a8ab1077a587bac988879cdddbb4b
SHA2567713f67dacb77cbaf66a18752d5a0f1c187e2b54efb8024ef43883406be404c2
SHA512b43274ff744c4a274293f73fdc464f155020569f680fb2b264e05e26255faf244ce4cd0b74eaa094338c65bba0a9192b2bc70675f66e55e03b4dff0726fcb4fc