Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2023, 08:04
Static task
static1
Behavioral task
behavioral1
Sample
ecfe5353c99db959d04bda59bcb891ee2a5e01c8129a3e4419e891d0110f597a.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
ecfe5353c99db959d04bda59bcb891ee2a5e01c8129a3e4419e891d0110f597a.exe
Resource
win10v2004-20231023-en
General
-
Target
ecfe5353c99db959d04bda59bcb891ee2a5e01c8129a3e4419e891d0110f597a.exe
-
Size
1.1MB
-
MD5
6ae9dace46fba5eea7310dcfd647342c
-
SHA1
8b7e562c8166de3cdc4f53c95ce9eaaae22777ec
-
SHA256
ecfe5353c99db959d04bda59bcb891ee2a5e01c8129a3e4419e891d0110f597a
-
SHA512
5458667eaee51f5be6c5b2a8a86733b218e80004a63833008c3397c592d300617b84a1c67701605a3d46bce6fd0517dc42120d1db6b38ed7e0033b04d46d0733
-
SSDEEP
24576:CH0dl8myX9Bg42QoXFkrzkmmlSgRDko0lG4Z8r7Qfbkiu5QM:CcaClSFlG4ZM7QzMb
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1114462139-3090196418-29517368-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1114462139-3090196418-29517368-1000\Control Panel\International\Geo\Nation ecfe5353c99db959d04bda59bcb891ee2a5e01c8129a3e4419e891d0110f597a.exe Key value queried \REGISTRY\USER\S-1-5-21-1114462139-3090196418-29517368-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1114462139-3090196418-29517368-1000\Control Panel\International\Geo\Nation WScript.exe -
Deletes itself 1 IoCs
pid Process 3104 svchcst.exe -
Executes dropped EXE 3 IoCs
pid Process 3104 svchcst.exe 3112 svchcst.exe 3572 svchcst.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1114462139-3090196418-29517368-1000_Classes\Local Settings ecfe5353c99db959d04bda59bcb891ee2a5e01c8129a3e4419e891d0110f597a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 688 ecfe5353c99db959d04bda59bcb891ee2a5e01c8129a3e4419e891d0110f597a.exe 688 ecfe5353c99db959d04bda59bcb891ee2a5e01c8129a3e4419e891d0110f597a.exe 688 ecfe5353c99db959d04bda59bcb891ee2a5e01c8129a3e4419e891d0110f597a.exe 688 ecfe5353c99db959d04bda59bcb891ee2a5e01c8129a3e4419e891d0110f597a.exe 688 ecfe5353c99db959d04bda59bcb891ee2a5e01c8129a3e4419e891d0110f597a.exe 688 ecfe5353c99db959d04bda59bcb891ee2a5e01c8129a3e4419e891d0110f597a.exe 3104 svchcst.exe 3104 svchcst.exe 3104 svchcst.exe 3104 svchcst.exe 3104 svchcst.exe 3104 svchcst.exe 3104 svchcst.exe 3104 svchcst.exe 3104 svchcst.exe 3104 svchcst.exe 3104 svchcst.exe 3104 svchcst.exe 3104 svchcst.exe 3104 svchcst.exe 3104 svchcst.exe 3104 svchcst.exe 3104 svchcst.exe 3104 svchcst.exe 3104 svchcst.exe 3104 svchcst.exe 3104 svchcst.exe 3104 svchcst.exe 3104 svchcst.exe 3104 svchcst.exe 3104 svchcst.exe 3104 svchcst.exe 3104 svchcst.exe 3104 svchcst.exe 3104 svchcst.exe 3104 svchcst.exe 3104 svchcst.exe 3104 svchcst.exe 3104 svchcst.exe 3104 svchcst.exe 3104 svchcst.exe 3104 svchcst.exe 3104 svchcst.exe 3104 svchcst.exe 3104 svchcst.exe 3104 svchcst.exe 3104 svchcst.exe 3104 svchcst.exe 3104 svchcst.exe 3104 svchcst.exe 3104 svchcst.exe 3104 svchcst.exe 3104 svchcst.exe 3104 svchcst.exe 3104 svchcst.exe 3104 svchcst.exe 3104 svchcst.exe 3104 svchcst.exe 3104 svchcst.exe 3104 svchcst.exe 3104 svchcst.exe 3104 svchcst.exe 3104 svchcst.exe 3104 svchcst.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 688 ecfe5353c99db959d04bda59bcb891ee2a5e01c8129a3e4419e891d0110f597a.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 688 ecfe5353c99db959d04bda59bcb891ee2a5e01c8129a3e4419e891d0110f597a.exe 688 ecfe5353c99db959d04bda59bcb891ee2a5e01c8129a3e4419e891d0110f597a.exe 3104 svchcst.exe 3104 svchcst.exe 3112 svchcst.exe 3572 svchcst.exe 3572 svchcst.exe 3112 svchcst.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 688 wrote to memory of 3076 688 ecfe5353c99db959d04bda59bcb891ee2a5e01c8129a3e4419e891d0110f597a.exe 88 PID 688 wrote to memory of 3076 688 ecfe5353c99db959d04bda59bcb891ee2a5e01c8129a3e4419e891d0110f597a.exe 88 PID 688 wrote to memory of 3076 688 ecfe5353c99db959d04bda59bcb891ee2a5e01c8129a3e4419e891d0110f597a.exe 88 PID 688 wrote to memory of 2384 688 ecfe5353c99db959d04bda59bcb891ee2a5e01c8129a3e4419e891d0110f597a.exe 86 PID 688 wrote to memory of 2384 688 ecfe5353c99db959d04bda59bcb891ee2a5e01c8129a3e4419e891d0110f597a.exe 86 PID 688 wrote to memory of 2384 688 ecfe5353c99db959d04bda59bcb891ee2a5e01c8129a3e4419e891d0110f597a.exe 86 PID 688 wrote to memory of 1432 688 ecfe5353c99db959d04bda59bcb891ee2a5e01c8129a3e4419e891d0110f597a.exe 87 PID 688 wrote to memory of 1432 688 ecfe5353c99db959d04bda59bcb891ee2a5e01c8129a3e4419e891d0110f597a.exe 87 PID 688 wrote to memory of 1432 688 ecfe5353c99db959d04bda59bcb891ee2a5e01c8129a3e4419e891d0110f597a.exe 87 PID 3076 wrote to memory of 3104 3076 WScript.exe 94 PID 3076 wrote to memory of 3104 3076 WScript.exe 94 PID 3076 wrote to memory of 3104 3076 WScript.exe 94 PID 2384 wrote to memory of 3112 2384 WScript.exe 95 PID 2384 wrote to memory of 3112 2384 WScript.exe 95 PID 2384 wrote to memory of 3112 2384 WScript.exe 95 PID 1432 wrote to memory of 3572 1432 WScript.exe 96 PID 1432 wrote to memory of 3572 1432 WScript.exe 96 PID 1432 wrote to memory of 3572 1432 WScript.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\ecfe5353c99db959d04bda59bcb891ee2a5e01c8129a3e4419e891d0110f597a.exe"C:\Users\Admin\AppData\Local\Temp\ecfe5353c99db959d04bda59bcb891ee2a5e01c8129a3e4419e891d0110f597a.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:688 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3112
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3572
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3104
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
753B
MD5ca83e052ff5da728499fac0aecfd1e58
SHA1bcd9ab339610f378adc5b367e638eb173fb0a39d
SHA256a627061dcbda81de5e184365e7faaa880302e2bc04c9479ce0274891c6d0cb54
SHA5123bb59615e318c62f898a43a4b6239eb9efbd8b6929eddcfdc3a78bf6372ed809ee0eb292f5739d28806a9c4daca764e6a8e51a4ea6c93328962732ecbdc301eb
-
Filesize
753B
MD5ca83e052ff5da728499fac0aecfd1e58
SHA1bcd9ab339610f378adc5b367e638eb173fb0a39d
SHA256a627061dcbda81de5e184365e7faaa880302e2bc04c9479ce0274891c6d0cb54
SHA5123bb59615e318c62f898a43a4b6239eb9efbd8b6929eddcfdc3a78bf6372ed809ee0eb292f5739d28806a9c4daca764e6a8e51a4ea6c93328962732ecbdc301eb
-
Filesize
1.1MB
MD551b0e1f6e606ca9137eae88d58e01e4f
SHA1e27f667333345b67c242c2ef43db55928b5dcc35
SHA256828f5d9f93450036a05a16de8956d5cd0797ce518af37d63c3e4dde4187f9a38
SHA5126526e8ead3b84f879563016cca05744fe2e78398fa891998df4e312713b86a48ca6f939ed4d7daf3d75818219572402595de84a8a4d126a2cae27e40925ff03b
-
Filesize
1.1MB
MD551b0e1f6e606ca9137eae88d58e01e4f
SHA1e27f667333345b67c242c2ef43db55928b5dcc35
SHA256828f5d9f93450036a05a16de8956d5cd0797ce518af37d63c3e4dde4187f9a38
SHA5126526e8ead3b84f879563016cca05744fe2e78398fa891998df4e312713b86a48ca6f939ed4d7daf3d75818219572402595de84a8a4d126a2cae27e40925ff03b
-
Filesize
1.1MB
MD551b0e1f6e606ca9137eae88d58e01e4f
SHA1e27f667333345b67c242c2ef43db55928b5dcc35
SHA256828f5d9f93450036a05a16de8956d5cd0797ce518af37d63c3e4dde4187f9a38
SHA5126526e8ead3b84f879563016cca05744fe2e78398fa891998df4e312713b86a48ca6f939ed4d7daf3d75818219572402595de84a8a4d126a2cae27e40925ff03b
-
Filesize
1.1MB
MD551b0e1f6e606ca9137eae88d58e01e4f
SHA1e27f667333345b67c242c2ef43db55928b5dcc35
SHA256828f5d9f93450036a05a16de8956d5cd0797ce518af37d63c3e4dde4187f9a38
SHA5126526e8ead3b84f879563016cca05744fe2e78398fa891998df4e312713b86a48ca6f939ed4d7daf3d75818219572402595de84a8a4d126a2cae27e40925ff03b