Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    29/03/2024, 02:58

General

  • Target

    9c2b29e00b1b3075fc5488265c58413da15d345f8f4fbfd0d3e093ecf7537de7.exe

  • Size

    430KB

  • MD5

    e669f68966c75452231ac9ddc5561ded

  • SHA1

    605da3577624fb8aa6dfdc042543c737a7cfa8b9

  • SHA256

    9c2b29e00b1b3075fc5488265c58413da15d345f8f4fbfd0d3e093ecf7537de7

  • SHA512

    b63cded4668fbab34e173711b75e2a124f9d79d67f11556b192e40d3047f18ec193941032c57f1ed10ef2f7b7d3c834b8a938bd9347446d048d6c354e65c079b

  • SSDEEP

    12288:CzCr6D+2OkeG9F1xk1kwZRo5FbDFBQX6f6AkdIAELARixZFDuh:Cza2OkeG9jxyTo5Fbz/zkOLLARixXDuh

Score
7/10

Malware Config

Signatures

  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Drops startup file 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9c2b29e00b1b3075fc5488265c58413da15d345f8f4fbfd0d3e093ecf7537de7.exe
    "C:\Users\Admin\AppData\Local\Temp\9c2b29e00b1b3075fc5488265c58413da15d345f8f4fbfd0d3e093ecf7537de7.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2192
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
      2⤵
        PID:2652
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
        2⤵
          PID:2668

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\Microsoft\Config.ini

        Filesize

        92B

        MD5

        5611518085f0e601b7af262b73ca1e21

        SHA1

        679e284b4e15030b11e9fcab9e54090f6128c6c2

        SHA256

        8e59e3dc5427519534af0cfb2713d94388d03240f4f6d2c9ec6a13db1d9812ab

        SHA512

        0fc4c396d00386c7942366bab8bf30b59723f4a8b0d5bfe00dbc4a74df13acb68cd6616694a81de199bcd2409ff41b6dcaca931614165deefadd728350c52bcc

      • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

        Filesize

        753B

        MD5

        f2cc75f7b733d78c895cd694c43001fd

        SHA1

        60d407ce6e06da6b3002ddc25b48aba75f021980

        SHA256

        a3111a977b9863c02699408ce5fb0797c43da0a4dbdfb9cfc0db02df4e4c2474

        SHA512

        72cfd2d67ea043353b4d458d7c2c09d3e9ce4ba62846c8a4aa237a94b3fe015c6108791c8e0fcc9d7a8b9a000af28d804d83b96fc90a88be66c3460a1083cff8

      • \Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

        Filesize

        430KB

        MD5

        0f299205bc9451ed021f9b58a72e070e

        SHA1

        da145d7b42675c42a2ca8ea1a8c82bafcc24ba14

        SHA256

        d188f12e08d54b26b5ef4796e1bb1d8db15c2e9555fc658da7c4a31653f787b9

        SHA512

        8fb107c1dce89dc413e4dd2e2331afc9612cd72b828ab253e71bc391f8eba95f708a8ed9f0f53017bab44183f3524d8659d5596d5ca147f95deacf4420c7bed3

      • memory/2192-0-0x0000000000400000-0x0000000000553000-memory.dmp

        Filesize

        1.3MB

      • memory/2192-3-0x0000000000400000-0x0000000000553000-memory.dmp

        Filesize

        1.3MB

      • memory/2192-1-0x0000000000400000-0x0000000000553000-memory.dmp

        Filesize

        1.3MB

      • memory/2192-2-0x0000000000400000-0x0000000000553000-memory.dmp

        Filesize

        1.3MB

      • memory/2192-20-0x00000000002F0000-0x0000000000300000-memory.dmp

        Filesize

        64KB

      • memory/2192-15-0x00000000002F0000-0x0000000000300000-memory.dmp

        Filesize

        64KB