Analysis

  • max time kernel
    150s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    23/02/2024, 02:33

General

  • Target

    0619016866996d25027a3305331f832e6044f196620dbeed68feb2cfb68bea37.exe

  • Size

    1.1MB

  • MD5

    e8f5f42d38b510e9cba13f9e4d3814e6

  • SHA1

    2e88cd68b913dfee743ebc20a85d8bf11162f93b

  • SHA256

    0619016866996d25027a3305331f832e6044f196620dbeed68feb2cfb68bea37

  • SHA512

    899cc8a94a67ed44e62559fc5fb41d548431cc404c6dce9789440c7683bb43b9694f2cef658d9ddb863a95d4cd79be4a9c640c27f6a31c49c0dd474e2c0aa39a

  • SSDEEP

    24576:4qg8zeKPja85nd0T9RAN0P30mqym6hzsGoRlG4qqjwg1mRWRuV:44zeI/0XqymkulG4qmxmiuV

Score
7/10

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0619016866996d25027a3305331f832e6044f196620dbeed68feb2cfb68bea37.exe
    "C:\Users\Admin\AppData\Local\Temp\0619016866996d25027a3305331f832e6044f196620dbeed68feb2cfb68bea37.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1648
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
      2⤵
        PID:2520
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
        2⤵
          PID:3044

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Roaming\Microsoft\Config.ini

              Filesize

              92B

              MD5

              5611518085f0e601b7af262b73ca1e21

              SHA1

              679e284b4e15030b11e9fcab9e54090f6128c6c2

              SHA256

              8e59e3dc5427519534af0cfb2713d94388d03240f4f6d2c9ec6a13db1d9812ab

              SHA512

              0fc4c396d00386c7942366bab8bf30b59723f4a8b0d5bfe00dbc4a74df13acb68cd6616694a81de199bcd2409ff41b6dcaca931614165deefadd728350c52bcc

            • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

              Filesize

              753B

              MD5

              3866fb14e65b22344d5f669487b38094

              SHA1

              a1ce4e474f92ae248e1f504a129b8e3020dffb0a

              SHA256

              6fd8666e84122acf9ea95677cfdb634868f3f89c7534f6549960a621611e47d1

              SHA512

              a87d15362667b0996008f25a42be3e8174e3972940b016179838b23b5a2d9e8db8ff699d4865a076c640521d3eed30ea2f9e117a3c22ec5b384a620de6aee552

            • \Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

              Filesize

              1.1MB

              MD5

              ee89a2c8da0746d7f0029ad93227785a

              SHA1

              77597a684824f29f5c2bd3f0394b7a586f3a5890

              SHA256

              5ac64960345e922a5d05b0a99c2d845000e82ad577ea412f53317b70427a4ac1

              SHA512

              b8963aa16e55f166b703a3c452339a46961747d3d92c489c87fb08914b59a70157213e597f0b22ba52fdbe32b79c299ae886d17488aada8c67955fb44bf6f8ef

            • memory/1648-0-0x0000000000400000-0x0000000000553000-memory.dmp

              Filesize

              1.3MB

            • memory/1648-1-0x0000000000400000-0x0000000000553000-memory.dmp

              Filesize

              1.3MB

            • memory/1648-18-0x0000000001F60000-0x0000000001F70000-memory.dmp

              Filesize

              64KB

            • memory/1648-19-0x0000000001F60000-0x0000000001F70000-memory.dmp

              Filesize

              64KB

            • memory/1648-21-0x0000000000400000-0x0000000000553000-memory.dmp

              Filesize

              1.3MB

            • memory/1648-23-0x0000000001F60000-0x0000000001F70000-memory.dmp

              Filesize

              64KB

            • memory/1648-24-0x0000000001F60000-0x0000000001F70000-memory.dmp

              Filesize

              64KB