Analysis

  • max time kernel
    143s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/02/2024, 21:32

General

  • Target

    69c79d6a74061fc72681476777b2d3c6c9c536664908c3c123e3bf97d4223c04.exe

  • Size

    1.1MB

  • MD5

    25dacf027b6f22f9ccfd18979747d7cd

  • SHA1

    106456710ea0d36c27a7938e99f56a190ef2411d

  • SHA256

    69c79d6a74061fc72681476777b2d3c6c9c536664908c3c123e3bf97d4223c04

  • SHA512

    f02145faadc57b9ef1312ef0807aa1e8a0337b54a30b90d77d495dd56bc768478a2b0c0e13bacd99f7d5eb46983525bfddf183083a620381b9a017f8b4ce8f1a

  • SSDEEP

    24576:CH0dl8myX9Bg42QoXFkrzkmmlSgRDko0lG4Z8r7Qfbkiu5QD:CcaClSFlG4ZM7QzME

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\69c79d6a74061fc72681476777b2d3c6c9c536664908c3c123e3bf97d4223c04.exe
    "C:\Users\Admin\AppData\Local\Temp\69c79d6a74061fc72681476777b2d3c6c9c536664908c3c123e3bf97d4223c04.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4224
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
      2⤵
      • Checks computer location settings
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:3268
      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:4864
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
      2⤵
      • Checks computer location settings
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:4420
      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:4060
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
      2⤵
      • Checks computer location settings
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:4828
      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
        3⤵
        • Deletes itself
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:1676

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

          Filesize

          753B

          MD5

          764eccfba5465d73d62036796ea55b32

          SHA1

          adb9aca120cdc9795c1856746082fdbfa935e8db

          SHA256

          0f557b5082440808400e9245aa8b8b090409ada7d2298059f05ccdcdc6eeab9a

          SHA512

          cb892f39654fc4c3b8f9313fe1d93b56f359304d27397813727e66eaaafb363f44827d4904e110ed5bb277d483ae4733cf70157854fb4df61b0755acae642201

        • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

          Filesize

          1.1MB

          MD5

          6784dfd0cdd62ee9687c787f65d6350f

          SHA1

          c27c15046ca21da96bed3e16e6125c99ea78f215

          SHA256

          17ee8dec5038f0e27f29ac25ac628c6a718e81e949c4b60a414c55ecc1c052b8

          SHA512

          247134a235345d5765af2599bf6307cd9060182726dd6d655103a302e75ae25c853445bede02719c7c831ef27fb0e5ecb970262c7a8a02301e4c0360da6394ac