Analysis
-
max time kernel
141s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
15/11/2023, 23:38
Static task
static1
Behavioral task
behavioral1
Sample
b956b4ab30e068f9f6dceeff88ff2afd7655c26c5238ab1050e5fceb8b495d01.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
b956b4ab30e068f9f6dceeff88ff2afd7655c26c5238ab1050e5fceb8b495d01.exe
Resource
win10v2004-20231020-en
General
-
Target
b956b4ab30e068f9f6dceeff88ff2afd7655c26c5238ab1050e5fceb8b495d01.exe
-
Size
1.1MB
-
MD5
b0e7027ec1db1667fe9029151eb71d28
-
SHA1
6cd71af8f9d3427ae55cddb713c2f3f5acb9a270
-
SHA256
b956b4ab30e068f9f6dceeff88ff2afd7655c26c5238ab1050e5fceb8b495d01
-
SHA512
fabd852767fba04f6583671bb560276048044dafefbf4159d55643701d987e735c9c7016ad08a9927e1e93cc496777f1cc64ce6954dfbb425ec9e4bd1077e3f6
-
SSDEEP
24576:gRW3N/0f/oAPoRBchI5anfOlAUAi1K6oElG4lBujFAvCyRE:g5ApamAUAQ/lG4lBmFAvZE
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation b956b4ab30e068f9f6dceeff88ff2afd7655c26c5238ab1050e5fceb8b495d01.exe Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation WScript.exe -
Deletes itself 1 IoCs
pid Process 1160 svchcst.exe -
Executes dropped EXE 2 IoCs
pid Process 1160 svchcst.exe 456 svchcst.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000_Classes\Local Settings b956b4ab30e068f9f6dceeff88ff2afd7655c26c5238ab1050e5fceb8b495d01.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1988 b956b4ab30e068f9f6dceeff88ff2afd7655c26c5238ab1050e5fceb8b495d01.exe 1988 b956b4ab30e068f9f6dceeff88ff2afd7655c26c5238ab1050e5fceb8b495d01.exe 1988 b956b4ab30e068f9f6dceeff88ff2afd7655c26c5238ab1050e5fceb8b495d01.exe 1988 b956b4ab30e068f9f6dceeff88ff2afd7655c26c5238ab1050e5fceb8b495d01.exe 1988 b956b4ab30e068f9f6dceeff88ff2afd7655c26c5238ab1050e5fceb8b495d01.exe 1988 b956b4ab30e068f9f6dceeff88ff2afd7655c26c5238ab1050e5fceb8b495d01.exe 1160 svchcst.exe 1160 svchcst.exe 1160 svchcst.exe 1160 svchcst.exe 1160 svchcst.exe 1160 svchcst.exe 1160 svchcst.exe 1160 svchcst.exe 1160 svchcst.exe 1160 svchcst.exe 1160 svchcst.exe 1160 svchcst.exe 1160 svchcst.exe 1160 svchcst.exe 1160 svchcst.exe 1160 svchcst.exe 1160 svchcst.exe 1160 svchcst.exe 1160 svchcst.exe 1160 svchcst.exe 1160 svchcst.exe 1160 svchcst.exe 1160 svchcst.exe 1160 svchcst.exe 1160 svchcst.exe 1160 svchcst.exe 1160 svchcst.exe 1160 svchcst.exe 1160 svchcst.exe 1160 svchcst.exe 1160 svchcst.exe 1160 svchcst.exe 1160 svchcst.exe 1160 svchcst.exe 1160 svchcst.exe 1160 svchcst.exe 1160 svchcst.exe 1160 svchcst.exe 1160 svchcst.exe 1160 svchcst.exe 1160 svchcst.exe 1160 svchcst.exe 1160 svchcst.exe 1160 svchcst.exe 1160 svchcst.exe 1160 svchcst.exe 1160 svchcst.exe 1160 svchcst.exe 1160 svchcst.exe 1160 svchcst.exe 1160 svchcst.exe 1160 svchcst.exe 1160 svchcst.exe 1160 svchcst.exe 1160 svchcst.exe 1160 svchcst.exe 1160 svchcst.exe 1160 svchcst.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1988 b956b4ab30e068f9f6dceeff88ff2afd7655c26c5238ab1050e5fceb8b495d01.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1988 b956b4ab30e068f9f6dceeff88ff2afd7655c26c5238ab1050e5fceb8b495d01.exe 1988 b956b4ab30e068f9f6dceeff88ff2afd7655c26c5238ab1050e5fceb8b495d01.exe 1160 svchcst.exe 1160 svchcst.exe 456 svchcst.exe 456 svchcst.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1988 wrote to memory of 2196 1988 b956b4ab30e068f9f6dceeff88ff2afd7655c26c5238ab1050e5fceb8b495d01.exe 89 PID 1988 wrote to memory of 2196 1988 b956b4ab30e068f9f6dceeff88ff2afd7655c26c5238ab1050e5fceb8b495d01.exe 89 PID 1988 wrote to memory of 2196 1988 b956b4ab30e068f9f6dceeff88ff2afd7655c26c5238ab1050e5fceb8b495d01.exe 89 PID 1988 wrote to memory of 2368 1988 b956b4ab30e068f9f6dceeff88ff2afd7655c26c5238ab1050e5fceb8b495d01.exe 91 PID 1988 wrote to memory of 2368 1988 b956b4ab30e068f9f6dceeff88ff2afd7655c26c5238ab1050e5fceb8b495d01.exe 91 PID 1988 wrote to memory of 2368 1988 b956b4ab30e068f9f6dceeff88ff2afd7655c26c5238ab1050e5fceb8b495d01.exe 91 PID 1988 wrote to memory of 4088 1988 b956b4ab30e068f9f6dceeff88ff2afd7655c26c5238ab1050e5fceb8b495d01.exe 90 PID 1988 wrote to memory of 4088 1988 b956b4ab30e068f9f6dceeff88ff2afd7655c26c5238ab1050e5fceb8b495d01.exe 90 PID 1988 wrote to memory of 4088 1988 b956b4ab30e068f9f6dceeff88ff2afd7655c26c5238ab1050e5fceb8b495d01.exe 90 PID 2196 wrote to memory of 1160 2196 WScript.exe 98 PID 2196 wrote to memory of 1160 2196 WScript.exe 98 PID 2196 wrote to memory of 1160 2196 WScript.exe 98 PID 4088 wrote to memory of 456 4088 WScript.exe 99 PID 4088 wrote to memory of 456 4088 WScript.exe 99 PID 4088 wrote to memory of 456 4088 WScript.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\b956b4ab30e068f9f6dceeff88ff2afd7655c26c5238ab1050e5fceb8b495d01.exe"C:\Users\Admin\AppData\Local\Temp\b956b4ab30e068f9f6dceeff88ff2afd7655c26c5238ab1050e5fceb8b495d01.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1160
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:456
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- Modifies registry class
PID:2368
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
753B
MD5ea3e0cd4b34496617ac8cd6ad7648ba0
SHA1c23060e88bbd050645d464117e552aac4dbb03c5
SHA25670101736eb5a964cc1a3b7c91f9b05c816a16651f42d07bda3685ba04e920732
SHA5123ac9a8b643873fd2eb32b7fee9fd8afc80d93f7b347017b797e913e7d901265db9153bfb002908366af19daa6d6dd23e31937b803d1ae47ea7733d2d33e3e0fa
-
Filesize
753B
MD5ea3e0cd4b34496617ac8cd6ad7648ba0
SHA1c23060e88bbd050645d464117e552aac4dbb03c5
SHA25670101736eb5a964cc1a3b7c91f9b05c816a16651f42d07bda3685ba04e920732
SHA5123ac9a8b643873fd2eb32b7fee9fd8afc80d93f7b347017b797e913e7d901265db9153bfb002908366af19daa6d6dd23e31937b803d1ae47ea7733d2d33e3e0fa
-
Filesize
1.1MB
MD5ea14ba4906a25995731e2009c3e31037
SHA13088cd1b84beda2959a9d0420346924740dd4e4f
SHA256a67b885f84c424c272bc2fc523e5ca97245c834bbecec43fe10ae63ac3d937c0
SHA5124e16f78f24af969bf78762f51fba91d63b45d3afe299ee6fb55949a6d66b300629f0b8f74d4ba051fbf89ae65b18b01c1ae13c25a01ebcc83bc1fac03c2b1b87
-
Filesize
1.1MB
MD5ea14ba4906a25995731e2009c3e31037
SHA13088cd1b84beda2959a9d0420346924740dd4e4f
SHA256a67b885f84c424c272bc2fc523e5ca97245c834bbecec43fe10ae63ac3d937c0
SHA5124e16f78f24af969bf78762f51fba91d63b45d3afe299ee6fb55949a6d66b300629f0b8f74d4ba051fbf89ae65b18b01c1ae13c25a01ebcc83bc1fac03c2b1b87
-
Filesize
1.1MB
MD5ea14ba4906a25995731e2009c3e31037
SHA13088cd1b84beda2959a9d0420346924740dd4e4f
SHA256a67b885f84c424c272bc2fc523e5ca97245c834bbecec43fe10ae63ac3d937c0
SHA5124e16f78f24af969bf78762f51fba91d63b45d3afe299ee6fb55949a6d66b300629f0b8f74d4ba051fbf89ae65b18b01c1ae13c25a01ebcc83bc1fac03c2b1b87