Analysis
-
max time kernel
143s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
03/02/2024, 21:32
Static task
static1
Behavioral task
behavioral1
Sample
69c79d6a74061fc72681476777b2d3c6c9c536664908c3c123e3bf97d4223c04.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
69c79d6a74061fc72681476777b2d3c6c9c536664908c3c123e3bf97d4223c04.exe
Resource
win10v2004-20231215-en
General
-
Target
69c79d6a74061fc72681476777b2d3c6c9c536664908c3c123e3bf97d4223c04.exe
-
Size
1.1MB
-
MD5
25dacf027b6f22f9ccfd18979747d7cd
-
SHA1
106456710ea0d36c27a7938e99f56a190ef2411d
-
SHA256
69c79d6a74061fc72681476777b2d3c6c9c536664908c3c123e3bf97d4223c04
-
SHA512
f02145faadc57b9ef1312ef0807aa1e8a0337b54a30b90d77d495dd56bc768478a2b0c0e13bacd99f7d5eb46983525bfddf183083a620381b9a017f8b4ce8f1a
-
SSDEEP
24576:CH0dl8myX9Bg42QoXFkrzkmmlSgRDko0lG4Z8r7Qfbkiu5QD:CcaClSFlG4ZM7QzME
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Control Panel\International\Geo\Nation 69c79d6a74061fc72681476777b2d3c6c9c536664908c3c123e3bf97d4223c04.exe Key value queried \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Control Panel\International\Geo\Nation WScript.exe -
Deletes itself 1 IoCs
pid Process 1676 svchcst.exe -
Executes dropped EXE 3 IoCs
pid Process 1676 svchcst.exe 4864 svchcst.exe 4060 svchcst.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\Local Settings 69c79d6a74061fc72681476777b2d3c6c9c536664908c3c123e3bf97d4223c04.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4224 69c79d6a74061fc72681476777b2d3c6c9c536664908c3c123e3bf97d4223c04.exe 4224 69c79d6a74061fc72681476777b2d3c6c9c536664908c3c123e3bf97d4223c04.exe 4224 69c79d6a74061fc72681476777b2d3c6c9c536664908c3c123e3bf97d4223c04.exe 4224 69c79d6a74061fc72681476777b2d3c6c9c536664908c3c123e3bf97d4223c04.exe 4224 69c79d6a74061fc72681476777b2d3c6c9c536664908c3c123e3bf97d4223c04.exe 4224 69c79d6a74061fc72681476777b2d3c6c9c536664908c3c123e3bf97d4223c04.exe 1676 svchcst.exe 1676 svchcst.exe 1676 svchcst.exe 1676 svchcst.exe 1676 svchcst.exe 1676 svchcst.exe 1676 svchcst.exe 1676 svchcst.exe 1676 svchcst.exe 1676 svchcst.exe 1676 svchcst.exe 1676 svchcst.exe 1676 svchcst.exe 1676 svchcst.exe 1676 svchcst.exe 1676 svchcst.exe 1676 svchcst.exe 1676 svchcst.exe 1676 svchcst.exe 1676 svchcst.exe 1676 svchcst.exe 1676 svchcst.exe 1676 svchcst.exe 1676 svchcst.exe 1676 svchcst.exe 1676 svchcst.exe 1676 svchcst.exe 1676 svchcst.exe 1676 svchcst.exe 1676 svchcst.exe 1676 svchcst.exe 1676 svchcst.exe 1676 svchcst.exe 1676 svchcst.exe 1676 svchcst.exe 1676 svchcst.exe 1676 svchcst.exe 1676 svchcst.exe 1676 svchcst.exe 1676 svchcst.exe 1676 svchcst.exe 1676 svchcst.exe 1676 svchcst.exe 1676 svchcst.exe 1676 svchcst.exe 1676 svchcst.exe 1676 svchcst.exe 1676 svchcst.exe 1676 svchcst.exe 1676 svchcst.exe 1676 svchcst.exe 1676 svchcst.exe 1676 svchcst.exe 1676 svchcst.exe 1676 svchcst.exe 1676 svchcst.exe 1676 svchcst.exe 1676 svchcst.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4224 69c79d6a74061fc72681476777b2d3c6c9c536664908c3c123e3bf97d4223c04.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4224 69c79d6a74061fc72681476777b2d3c6c9c536664908c3c123e3bf97d4223c04.exe 4224 69c79d6a74061fc72681476777b2d3c6c9c536664908c3c123e3bf97d4223c04.exe 1676 svchcst.exe 4060 svchcst.exe 1676 svchcst.exe 4060 svchcst.exe 4864 svchcst.exe 4864 svchcst.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4224 wrote to memory of 3268 4224 69c79d6a74061fc72681476777b2d3c6c9c536664908c3c123e3bf97d4223c04.exe 83 PID 4224 wrote to memory of 3268 4224 69c79d6a74061fc72681476777b2d3c6c9c536664908c3c123e3bf97d4223c04.exe 83 PID 4224 wrote to memory of 3268 4224 69c79d6a74061fc72681476777b2d3c6c9c536664908c3c123e3bf97d4223c04.exe 83 PID 4224 wrote to memory of 4828 4224 69c79d6a74061fc72681476777b2d3c6c9c536664908c3c123e3bf97d4223c04.exe 85 PID 4224 wrote to memory of 4828 4224 69c79d6a74061fc72681476777b2d3c6c9c536664908c3c123e3bf97d4223c04.exe 85 PID 4224 wrote to memory of 4828 4224 69c79d6a74061fc72681476777b2d3c6c9c536664908c3c123e3bf97d4223c04.exe 85 PID 4224 wrote to memory of 4420 4224 69c79d6a74061fc72681476777b2d3c6c9c536664908c3c123e3bf97d4223c04.exe 84 PID 4224 wrote to memory of 4420 4224 69c79d6a74061fc72681476777b2d3c6c9c536664908c3c123e3bf97d4223c04.exe 84 PID 4224 wrote to memory of 4420 4224 69c79d6a74061fc72681476777b2d3c6c9c536664908c3c123e3bf97d4223c04.exe 84 PID 4828 wrote to memory of 1676 4828 WScript.exe 90 PID 4828 wrote to memory of 1676 4828 WScript.exe 90 PID 4828 wrote to memory of 1676 4828 WScript.exe 90 PID 3268 wrote to memory of 4864 3268 WScript.exe 92 PID 3268 wrote to memory of 4864 3268 WScript.exe 92 PID 3268 wrote to memory of 4864 3268 WScript.exe 92 PID 4420 wrote to memory of 4060 4420 WScript.exe 91 PID 4420 wrote to memory of 4060 4420 WScript.exe 91 PID 4420 wrote to memory of 4060 4420 WScript.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\69c79d6a74061fc72681476777b2d3c6c9c536664908c3c123e3bf97d4223c04.exe"C:\Users\Admin\AppData\Local\Temp\69c79d6a74061fc72681476777b2d3c6c9c536664908c3c123e3bf97d4223c04.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3268 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4864
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4060
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1676
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
753B
MD5764eccfba5465d73d62036796ea55b32
SHA1adb9aca120cdc9795c1856746082fdbfa935e8db
SHA2560f557b5082440808400e9245aa8b8b090409ada7d2298059f05ccdcdc6eeab9a
SHA512cb892f39654fc4c3b8f9313fe1d93b56f359304d27397813727e66eaaafb363f44827d4904e110ed5bb277d483ae4733cf70157854fb4df61b0755acae642201
-
Filesize
1.1MB
MD56784dfd0cdd62ee9687c787f65d6350f
SHA1c27c15046ca21da96bed3e16e6125c99ea78f215
SHA25617ee8dec5038f0e27f29ac25ac628c6a718e81e949c4b60a414c55ecc1c052b8
SHA512247134a235345d5765af2599bf6307cd9060182726dd6d655103a302e75ae25c853445bede02719c7c831ef27fb0e5ecb970262c7a8a02301e4c0360da6394ac