Analysis

  • max time kernel
    172s
  • max time network
    187s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/10/2023, 23:03

General

  • Target

    733bcdee3e7e2fae986390ba0418d6956e16e3c08b27d33e2141c20d939c4bfe.exe

  • Size

    1.1MB

  • MD5

    7b0378229a616126732307655969b372

  • SHA1

    55fc0c0b4df00ff97bd3afc4a54fde476ef3eb75

  • SHA256

    733bcdee3e7e2fae986390ba0418d6956e16e3c08b27d33e2141c20d939c4bfe

  • SHA512

    d1163fdddeb9586e484ffff49cfb1a2c306b2ad822e2276e6832daa92af753f3d5a8cf54cecb2a623d046614c2bda85a47f00be23271841a82dc1abd7f3080b2

  • SSDEEP

    24576:CH0dl8myX9Bg42QoXFkrzkmmlSgRDko0lG4Z8r7Qfbkiu5Qa:CcaClSFlG4ZM7QzM5

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 5 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\733bcdee3e7e2fae986390ba0418d6956e16e3c08b27d33e2141c20d939c4bfe.exe
    "C:\Users\Admin\AppData\Local\Temp\733bcdee3e7e2fae986390ba0418d6956e16e3c08b27d33e2141c20d939c4bfe.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1376
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
      2⤵
      • Checks computer location settings
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:3840
      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:2564
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
      2⤵
      • Checks computer location settings
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:544
      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2868
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
      2⤵
      • Checks computer location settings
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:4728
      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:4640
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
      2⤵
      • Checks computer location settings
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1652
      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:372

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

    Filesize

    753B

    MD5

    3f8eca42d2ff69756be0bedb789372a5

    SHA1

    c5a0191db4c4e68bedae97bd819da339cd2c8a7a

    SHA256

    b7348dbcc8d0959506b6bd79e192327069f9af82fb4aecb3b5e9e7fc5d9b49bc

    SHA512

    38fc65af5685597d3107dfcee54973d0e4b7efe77a9fb6b24abd75dac22730a4083035b85500fd7e03c1041994b981dbed87e5c729df5df441b624c6c4bd19c2

  • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

    Filesize

    753B

    MD5

    3f8eca42d2ff69756be0bedb789372a5

    SHA1

    c5a0191db4c4e68bedae97bd819da339cd2c8a7a

    SHA256

    b7348dbcc8d0959506b6bd79e192327069f9af82fb4aecb3b5e9e7fc5d9b49bc

    SHA512

    38fc65af5685597d3107dfcee54973d0e4b7efe77a9fb6b24abd75dac22730a4083035b85500fd7e03c1041994b981dbed87e5c729df5df441b624c6c4bd19c2

  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    1.1MB

    MD5

    47072f58a9777576b6bbd09fa385e2ba

    SHA1

    93cd65c5cb21687e4a76ed731e0d5ddc49d872b4

    SHA256

    06cde68f78a51e5b0a7a4bdb36de21692295fc80409f1fdc93be6781f88bb69e

    SHA512

    565a59637ce67182912054fa5d79557439725a73702d3a44f62df3b12ecbbcf0152c92205be3c0c855336d34b2320cf0457a3486e1e4f07ac82930167bec8068

  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    1.1MB

    MD5

    47072f58a9777576b6bbd09fa385e2ba

    SHA1

    93cd65c5cb21687e4a76ed731e0d5ddc49d872b4

    SHA256

    06cde68f78a51e5b0a7a4bdb36de21692295fc80409f1fdc93be6781f88bb69e

    SHA512

    565a59637ce67182912054fa5d79557439725a73702d3a44f62df3b12ecbbcf0152c92205be3c0c855336d34b2320cf0457a3486e1e4f07ac82930167bec8068

  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    1.1MB

    MD5

    47072f58a9777576b6bbd09fa385e2ba

    SHA1

    93cd65c5cb21687e4a76ed731e0d5ddc49d872b4

    SHA256

    06cde68f78a51e5b0a7a4bdb36de21692295fc80409f1fdc93be6781f88bb69e

    SHA512

    565a59637ce67182912054fa5d79557439725a73702d3a44f62df3b12ecbbcf0152c92205be3c0c855336d34b2320cf0457a3486e1e4f07ac82930167bec8068

  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    1.1MB

    MD5

    47072f58a9777576b6bbd09fa385e2ba

    SHA1

    93cd65c5cb21687e4a76ed731e0d5ddc49d872b4

    SHA256

    06cde68f78a51e5b0a7a4bdb36de21692295fc80409f1fdc93be6781f88bb69e

    SHA512

    565a59637ce67182912054fa5d79557439725a73702d3a44f62df3b12ecbbcf0152c92205be3c0c855336d34b2320cf0457a3486e1e4f07ac82930167bec8068

  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    1.1MB

    MD5

    47072f58a9777576b6bbd09fa385e2ba

    SHA1

    93cd65c5cb21687e4a76ed731e0d5ddc49d872b4

    SHA256

    06cde68f78a51e5b0a7a4bdb36de21692295fc80409f1fdc93be6781f88bb69e

    SHA512

    565a59637ce67182912054fa5d79557439725a73702d3a44f62df3b12ecbbcf0152c92205be3c0c855336d34b2320cf0457a3486e1e4f07ac82930167bec8068