Analysis

  • max time kernel
    50s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-11-2023 01:01

General

  • Target

    6823c34387e255318c32cb43dfd9eb1bcc0300f2c3d5cee7f5dcf518026b89d3.exe

  • Size

    1.1MB

  • MD5

    36fee5079bf0163a653ab19789aa76d2

  • SHA1

    059bb32e6a779354da693d47d867053407d5d720

  • SHA256

    6823c34387e255318c32cb43dfd9eb1bcc0300f2c3d5cee7f5dcf518026b89d3

  • SHA512

    fe1d2068847b56bacac132226a47f200612ac326e99ff0c34aaaa7fe1e4ece3a50e4521b996dc2629fc10a23f1e9c0fe378fb50abdde80969250f00228487541

  • SSDEEP

    24576:zkEq6Xru36vHi3ubATxjr/AL9d81HuDL/Y7LmtYpD6BaVo2ap:lm3oy/68Vun/5sXo2ap

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6823c34387e255318c32cb43dfd9eb1bcc0300f2c3d5cee7f5dcf518026b89d3.exe
    "C:\Users\Admin\AppData\Local\Temp\6823c34387e255318c32cb43dfd9eb1bcc0300f2c3d5cee7f5dcf518026b89d3.exe"
    1⤵
    • Checks computer location settings
    • Drops startup file
    • Adds Run key to start application
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4708
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
      2⤵
        PID:1008
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
        2⤵
          PID:4344
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
          2⤵
            PID:2688

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Microsoft\Config.ini

          Filesize

          92B

          MD5

          5611518085f0e601b7af262b73ca1e21

          SHA1

          679e284b4e15030b11e9fcab9e54090f6128c6c2

          SHA256

          8e59e3dc5427519534af0cfb2713d94388d03240f4f6d2c9ec6a13db1d9812ab

          SHA512

          0fc4c396d00386c7942366bab8bf30b59723f4a8b0d5bfe00dbc4a74df13acb68cd6616694a81de199bcd2409ff41b6dcaca931614165deefadd728350c52bcc

        • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

          Filesize

          753B

          MD5

          c55311ef2688278a68890c12db97d087

          SHA1

          0f7c6c2fdf451760fb8132b5c07d163f496e042b

          SHA256

          ce0ffc92d5060a05586734f802c8cde0c0a58adf783d0cd8d7fd5950cc536043

          SHA512

          840f93d884bb4022ff24651474eb0e0127fb9638d29cef2eb5ac8931745fbafd677a29e7fd13f89e9bdc947b5a54a77a7fa2fceb46f7f23d61f0558efad73cc9

        • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

          Filesize

          753B

          MD5

          c55311ef2688278a68890c12db97d087

          SHA1

          0f7c6c2fdf451760fb8132b5c07d163f496e042b

          SHA256

          ce0ffc92d5060a05586734f802c8cde0c0a58adf783d0cd8d7fd5950cc536043

          SHA512

          840f93d884bb4022ff24651474eb0e0127fb9638d29cef2eb5ac8931745fbafd677a29e7fd13f89e9bdc947b5a54a77a7fa2fceb46f7f23d61f0558efad73cc9

        • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

          Filesize

          1.1MB

          MD5

          beea000f9f6fd4a0feefac7f1582895d

          SHA1

          e3ff2e2c04c40b1f9d49fd79dac07a179c1c24da

          SHA256

          f44e1d9f2f2c411e10e6b7af8d176d8c483a75a57ea2ecbab16e9dad00a79e41

          SHA512

          cd0f888e8059e51ca02cff89963ddc231198976186fcc5efa41b06d9ed8039a03a6d367d3f67d6c918a14bf60b2cc6004688ebc79e82a9cc000f3f421ff8f051

        • memory/4708-0-0x0000000000400000-0x0000000000551000-memory.dmp

          Filesize

          1.3MB

        • memory/4708-1-0x0000000000400000-0x0000000000551000-memory.dmp

          Filesize

          1.3MB