Analysis

  • max time kernel
    152s
  • max time network
    198s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-10-2023 01:03

General

  • Target

    df06f8914b7665b472008e50d9060fd5e9fb3fca7c96ad266c81b99c260f710b.exe

  • Size

    1.2MB

  • MD5

    b1cc0b4fc69022452ee3029ae3ee32a4

  • SHA1

    efa03a8a93ed4632c7e1ab7ad5e9b9bb7d27c9ec

  • SHA256

    df06f8914b7665b472008e50d9060fd5e9fb3fca7c96ad266c81b99c260f710b

  • SHA512

    10f0bca69148e291163593bc677ce72f19f85b9e13b7f1d4b5ba2a3200c3d2ab6c75513f98e09b184df18cfad9faa398cd8233f03edbb33c561fe8e35969cb0f

  • SSDEEP

    24576:vlAzF5dI2vYKWb6Dsq3P3K4XY0esxUAUbwvaoslG45wyvCj8z7mwL:voep0hUbSklG45lvMcL

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 5 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\df06f8914b7665b472008e50d9060fd5e9fb3fca7c96ad266c81b99c260f710b.exe
    "C:\Users\Admin\AppData\Local\Temp\df06f8914b7665b472008e50d9060fd5e9fb3fca7c96ad266c81b99c260f710b.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4460
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
      2⤵
      • Checks computer location settings
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:3816
      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:3876
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
      2⤵
      • Checks computer location settings
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:324
      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:1944
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
      2⤵
      • Checks computer location settings
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2124
      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:1416
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
      2⤵
      • Checks computer location settings
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:5096
      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:1636

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

    Filesize

    753B

    MD5

    acd3a61bf28f33d0fac81a8728f612bb

    SHA1

    5b8daa48270fe97e0e348f301f1ecbabfb7378c3

    SHA256

    cadbea5977002bd5f7882a387c7d3add54a6cbc63aed652a2dea0096551eac55

    SHA512

    1acf5cf41d19236752ad3d015eb59bd5fd08f13bfc377312912c173886ba5def6792f7bddd3eecb122d4adff568a3700617d6d9ea1e54a844e79b95623e791b8

  • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

    Filesize

    753B

    MD5

    acd3a61bf28f33d0fac81a8728f612bb

    SHA1

    5b8daa48270fe97e0e348f301f1ecbabfb7378c3

    SHA256

    cadbea5977002bd5f7882a387c7d3add54a6cbc63aed652a2dea0096551eac55

    SHA512

    1acf5cf41d19236752ad3d015eb59bd5fd08f13bfc377312912c173886ba5def6792f7bddd3eecb122d4adff568a3700617d6d9ea1e54a844e79b95623e791b8

  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    1.2MB

    MD5

    87071d1cecfe0b14822889e36c0a7632

    SHA1

    ca6b69f9b220e3f0e436ad21190b447f697d8ef5

    SHA256

    f3c5ab936d254892dd259e18421971917235ee210636bb0eba3c0d9602ae67ae

    SHA512

    92df7a57360766b721ba3987cdb231701ddb8b1924e8a0e7aa1de60898610def20c5390f77b8daf59cd2d0e197568d0322f8e45d4347301398ee4463ed7f8dcc

  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    1.2MB

    MD5

    87071d1cecfe0b14822889e36c0a7632

    SHA1

    ca6b69f9b220e3f0e436ad21190b447f697d8ef5

    SHA256

    f3c5ab936d254892dd259e18421971917235ee210636bb0eba3c0d9602ae67ae

    SHA512

    92df7a57360766b721ba3987cdb231701ddb8b1924e8a0e7aa1de60898610def20c5390f77b8daf59cd2d0e197568d0322f8e45d4347301398ee4463ed7f8dcc

  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    1.2MB

    MD5

    87071d1cecfe0b14822889e36c0a7632

    SHA1

    ca6b69f9b220e3f0e436ad21190b447f697d8ef5

    SHA256

    f3c5ab936d254892dd259e18421971917235ee210636bb0eba3c0d9602ae67ae

    SHA512

    92df7a57360766b721ba3987cdb231701ddb8b1924e8a0e7aa1de60898610def20c5390f77b8daf59cd2d0e197568d0322f8e45d4347301398ee4463ed7f8dcc

  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    1.2MB

    MD5

    87071d1cecfe0b14822889e36c0a7632

    SHA1

    ca6b69f9b220e3f0e436ad21190b447f697d8ef5

    SHA256

    f3c5ab936d254892dd259e18421971917235ee210636bb0eba3c0d9602ae67ae

    SHA512

    92df7a57360766b721ba3987cdb231701ddb8b1924e8a0e7aa1de60898610def20c5390f77b8daf59cd2d0e197568d0322f8e45d4347301398ee4463ed7f8dcc

  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    1.2MB

    MD5

    87071d1cecfe0b14822889e36c0a7632

    SHA1

    ca6b69f9b220e3f0e436ad21190b447f697d8ef5

    SHA256

    f3c5ab936d254892dd259e18421971917235ee210636bb0eba3c0d9602ae67ae

    SHA512

    92df7a57360766b721ba3987cdb231701ddb8b1924e8a0e7aa1de60898610def20c5390f77b8daf59cd2d0e197568d0322f8e45d4347301398ee4463ed7f8dcc