Analysis
-
max time kernel
152s -
max time network
198s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2023 01:03
Static task
static1
Behavioral task
behavioral1
Sample
df06f8914b7665b472008e50d9060fd5e9fb3fca7c96ad266c81b99c260f710b.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
df06f8914b7665b472008e50d9060fd5e9fb3fca7c96ad266c81b99c260f710b.exe
Resource
win10v2004-20230915-en
General
-
Target
df06f8914b7665b472008e50d9060fd5e9fb3fca7c96ad266c81b99c260f710b.exe
-
Size
1.2MB
-
MD5
b1cc0b4fc69022452ee3029ae3ee32a4
-
SHA1
efa03a8a93ed4632c7e1ab7ad5e9b9bb7d27c9ec
-
SHA256
df06f8914b7665b472008e50d9060fd5e9fb3fca7c96ad266c81b99c260f710b
-
SHA512
10f0bca69148e291163593bc677ce72f19f85b9e13b7f1d4b5ba2a3200c3d2ab6c75513f98e09b184df18cfad9faa398cd8233f03edbb33c561fe8e35969cb0f
-
SSDEEP
24576:vlAzF5dI2vYKWb6Dsq3P3K4XY0esxUAUbwvaoslG45wyvCj8z7mwL:voep0hUbSklG45lvMcL
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation df06f8914b7665b472008e50d9060fd5e9fb3fca7c96ad266c81b99c260f710b.exe Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation WScript.exe -
Executes dropped EXE 4 IoCs
pid Process 1944 svchcst.exe 3876 svchcst.exe 1416 svchcst.exe 1636 svchcst.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings df06f8914b7665b472008e50d9060fd5e9fb3fca7c96ad266c81b99c260f710b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4460 df06f8914b7665b472008e50d9060fd5e9fb3fca7c96ad266c81b99c260f710b.exe 4460 df06f8914b7665b472008e50d9060fd5e9fb3fca7c96ad266c81b99c260f710b.exe 4460 df06f8914b7665b472008e50d9060fd5e9fb3fca7c96ad266c81b99c260f710b.exe 4460 df06f8914b7665b472008e50d9060fd5e9fb3fca7c96ad266c81b99c260f710b.exe 4460 df06f8914b7665b472008e50d9060fd5e9fb3fca7c96ad266c81b99c260f710b.exe 4460 df06f8914b7665b472008e50d9060fd5e9fb3fca7c96ad266c81b99c260f710b.exe 4460 df06f8914b7665b472008e50d9060fd5e9fb3fca7c96ad266c81b99c260f710b.exe 4460 df06f8914b7665b472008e50d9060fd5e9fb3fca7c96ad266c81b99c260f710b.exe 4460 df06f8914b7665b472008e50d9060fd5e9fb3fca7c96ad266c81b99c260f710b.exe 4460 df06f8914b7665b472008e50d9060fd5e9fb3fca7c96ad266c81b99c260f710b.exe 3876 svchcst.exe 3876 svchcst.exe 3876 svchcst.exe 3876 svchcst.exe 3876 svchcst.exe 3876 svchcst.exe 3876 svchcst.exe 3876 svchcst.exe 3876 svchcst.exe 3876 svchcst.exe 3876 svchcst.exe 3876 svchcst.exe 3876 svchcst.exe 3876 svchcst.exe 3876 svchcst.exe 3876 svchcst.exe 3876 svchcst.exe 3876 svchcst.exe 3876 svchcst.exe 3876 svchcst.exe 3876 svchcst.exe 3876 svchcst.exe 3876 svchcst.exe 3876 svchcst.exe 3876 svchcst.exe 3876 svchcst.exe 3876 svchcst.exe 3876 svchcst.exe 3876 svchcst.exe 3876 svchcst.exe 3876 svchcst.exe 3876 svchcst.exe 3876 svchcst.exe 3876 svchcst.exe 3876 svchcst.exe 3876 svchcst.exe 3876 svchcst.exe 3876 svchcst.exe 3876 svchcst.exe 3876 svchcst.exe 3876 svchcst.exe 3876 svchcst.exe 3876 svchcst.exe 3876 svchcst.exe 3876 svchcst.exe 3876 svchcst.exe 3876 svchcst.exe 3876 svchcst.exe 3876 svchcst.exe 3876 svchcst.exe 3876 svchcst.exe 3876 svchcst.exe 3876 svchcst.exe 3876 svchcst.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4460 df06f8914b7665b472008e50d9060fd5e9fb3fca7c96ad266c81b99c260f710b.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 4460 df06f8914b7665b472008e50d9060fd5e9fb3fca7c96ad266c81b99c260f710b.exe 4460 df06f8914b7665b472008e50d9060fd5e9fb3fca7c96ad266c81b99c260f710b.exe 1944 svchcst.exe 1944 svchcst.exe 1416 svchcst.exe 1416 svchcst.exe 3876 svchcst.exe 3876 svchcst.exe 1636 svchcst.exe 1636 svchcst.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 4460 wrote to memory of 2124 4460 df06f8914b7665b472008e50d9060fd5e9fb3fca7c96ad266c81b99c260f710b.exe 89 PID 4460 wrote to memory of 2124 4460 df06f8914b7665b472008e50d9060fd5e9fb3fca7c96ad266c81b99c260f710b.exe 89 PID 4460 wrote to memory of 2124 4460 df06f8914b7665b472008e50d9060fd5e9fb3fca7c96ad266c81b99c260f710b.exe 89 PID 4460 wrote to memory of 3816 4460 df06f8914b7665b472008e50d9060fd5e9fb3fca7c96ad266c81b99c260f710b.exe 87 PID 4460 wrote to memory of 3816 4460 df06f8914b7665b472008e50d9060fd5e9fb3fca7c96ad266c81b99c260f710b.exe 87 PID 4460 wrote to memory of 3816 4460 df06f8914b7665b472008e50d9060fd5e9fb3fca7c96ad266c81b99c260f710b.exe 87 PID 4460 wrote to memory of 5096 4460 df06f8914b7665b472008e50d9060fd5e9fb3fca7c96ad266c81b99c260f710b.exe 90 PID 4460 wrote to memory of 5096 4460 df06f8914b7665b472008e50d9060fd5e9fb3fca7c96ad266c81b99c260f710b.exe 90 PID 4460 wrote to memory of 5096 4460 df06f8914b7665b472008e50d9060fd5e9fb3fca7c96ad266c81b99c260f710b.exe 90 PID 4460 wrote to memory of 324 4460 df06f8914b7665b472008e50d9060fd5e9fb3fca7c96ad266c81b99c260f710b.exe 88 PID 4460 wrote to memory of 324 4460 df06f8914b7665b472008e50d9060fd5e9fb3fca7c96ad266c81b99c260f710b.exe 88 PID 4460 wrote to memory of 324 4460 df06f8914b7665b472008e50d9060fd5e9fb3fca7c96ad266c81b99c260f710b.exe 88 PID 324 wrote to memory of 1944 324 WScript.exe 95 PID 324 wrote to memory of 1944 324 WScript.exe 95 PID 324 wrote to memory of 1944 324 WScript.exe 95 PID 3816 wrote to memory of 3876 3816 WScript.exe 94 PID 3816 wrote to memory of 3876 3816 WScript.exe 94 PID 3816 wrote to memory of 3876 3816 WScript.exe 94 PID 2124 wrote to memory of 1416 2124 WScript.exe 93 PID 2124 wrote to memory of 1416 2124 WScript.exe 93 PID 2124 wrote to memory of 1416 2124 WScript.exe 93 PID 5096 wrote to memory of 1636 5096 WScript.exe 96 PID 5096 wrote to memory of 1636 5096 WScript.exe 96 PID 5096 wrote to memory of 1636 5096 WScript.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\df06f8914b7665b472008e50d9060fd5e9fb3fca7c96ad266c81b99c260f710b.exe"C:\Users\Admin\AppData\Local\Temp\df06f8914b7665b472008e50d9060fd5e9fb3fca7c96ad266c81b99c260f710b.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3816 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3876
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:324 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1944
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1416
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1636
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
753B
MD5acd3a61bf28f33d0fac81a8728f612bb
SHA15b8daa48270fe97e0e348f301f1ecbabfb7378c3
SHA256cadbea5977002bd5f7882a387c7d3add54a6cbc63aed652a2dea0096551eac55
SHA5121acf5cf41d19236752ad3d015eb59bd5fd08f13bfc377312912c173886ba5def6792f7bddd3eecb122d4adff568a3700617d6d9ea1e54a844e79b95623e791b8
-
Filesize
753B
MD5acd3a61bf28f33d0fac81a8728f612bb
SHA15b8daa48270fe97e0e348f301f1ecbabfb7378c3
SHA256cadbea5977002bd5f7882a387c7d3add54a6cbc63aed652a2dea0096551eac55
SHA5121acf5cf41d19236752ad3d015eb59bd5fd08f13bfc377312912c173886ba5def6792f7bddd3eecb122d4adff568a3700617d6d9ea1e54a844e79b95623e791b8
-
Filesize
1.2MB
MD587071d1cecfe0b14822889e36c0a7632
SHA1ca6b69f9b220e3f0e436ad21190b447f697d8ef5
SHA256f3c5ab936d254892dd259e18421971917235ee210636bb0eba3c0d9602ae67ae
SHA51292df7a57360766b721ba3987cdb231701ddb8b1924e8a0e7aa1de60898610def20c5390f77b8daf59cd2d0e197568d0322f8e45d4347301398ee4463ed7f8dcc
-
Filesize
1.2MB
MD587071d1cecfe0b14822889e36c0a7632
SHA1ca6b69f9b220e3f0e436ad21190b447f697d8ef5
SHA256f3c5ab936d254892dd259e18421971917235ee210636bb0eba3c0d9602ae67ae
SHA51292df7a57360766b721ba3987cdb231701ddb8b1924e8a0e7aa1de60898610def20c5390f77b8daf59cd2d0e197568d0322f8e45d4347301398ee4463ed7f8dcc
-
Filesize
1.2MB
MD587071d1cecfe0b14822889e36c0a7632
SHA1ca6b69f9b220e3f0e436ad21190b447f697d8ef5
SHA256f3c5ab936d254892dd259e18421971917235ee210636bb0eba3c0d9602ae67ae
SHA51292df7a57360766b721ba3987cdb231701ddb8b1924e8a0e7aa1de60898610def20c5390f77b8daf59cd2d0e197568d0322f8e45d4347301398ee4463ed7f8dcc
-
Filesize
1.2MB
MD587071d1cecfe0b14822889e36c0a7632
SHA1ca6b69f9b220e3f0e436ad21190b447f697d8ef5
SHA256f3c5ab936d254892dd259e18421971917235ee210636bb0eba3c0d9602ae67ae
SHA51292df7a57360766b721ba3987cdb231701ddb8b1924e8a0e7aa1de60898610def20c5390f77b8daf59cd2d0e197568d0322f8e45d4347301398ee4463ed7f8dcc
-
Filesize
1.2MB
MD587071d1cecfe0b14822889e36c0a7632
SHA1ca6b69f9b220e3f0e436ad21190b447f697d8ef5
SHA256f3c5ab936d254892dd259e18421971917235ee210636bb0eba3c0d9602ae67ae
SHA51292df7a57360766b721ba3987cdb231701ddb8b1924e8a0e7aa1de60898610def20c5390f77b8daf59cd2d0e197568d0322f8e45d4347301398ee4463ed7f8dcc