Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-12-2023 11:40

General

  • Target

    89492116149f764224766a6d7a8782a3.exe

  • Size

    430KB

  • MD5

    89492116149f764224766a6d7a8782a3

  • SHA1

    da9883f8d4860ba35a3af68d97537fec30770391

  • SHA256

    a4a6eaa1affd1edc04c624aea49e517cdaad3453535c6f2213610bb7224836cb

  • SHA512

    8880888453f66bc70f88882cb02bd1c6f9a84283572ab9031403369f63c10f42b0dbd6f51aa5679c0eda099b018cc5b174296800767d03061b9ca1716c6092e9

  • SSDEEP

    12288:ibee0PGl89WazvzkmMxM+ltxQMAn0Iv1b70ZSf2o:2edGBazvZMHltxtIv1bUS+o

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\89492116149f764224766a6d7a8782a3.exe
    "C:\Users\Admin\AppData\Local\Temp\89492116149f764224766a6d7a8782a3.exe"
    1⤵
    • Checks computer location settings
    • Drops startup file
    • Adds Run key to start application
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2716
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS1.vbs"
      2⤵
        PID:1552

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\VBS1.vbs

      Filesize

      653B

      MD5

      1f7093b2934f39cbdfebb654b0f57275

      SHA1

      6ac2b92c48a23d452f8c78aff8dbf83c89d35992

      SHA256

      d069264c81c768495e25951628f4dbbcb387ff88b82d5770707a1fea09aa8dee

      SHA512

      5de782cee42e082d4c647f9244b6346d81285e23b075fdcbc4634607279f921cfb13cecbfd06ea36fd86f20facc303f73fc99817dabcd6b33beac8664bc6cad2

    • memory/2716-0-0x0000000000400000-0x0000000000575000-memory.dmp

      Filesize

      1.5MB

    • memory/2716-1-0x0000000000400000-0x0000000000575000-memory.dmp

      Filesize

      1.5MB

    • memory/2716-12-0x0000000000400000-0x0000000000575000-memory.dmp

      Filesize

      1.5MB