Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
16/04/2024, 18:24
Static task
static1
Behavioral task
behavioral1
Sample
03334d2fa2c403d6577069b8987addb95d7a6f0d4b3e7379a57b71e0e5a5172c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
03334d2fa2c403d6577069b8987addb95d7a6f0d4b3e7379a57b71e0e5a5172c.exe
Resource
win10v2004-20240412-en
General
-
Target
03334d2fa2c403d6577069b8987addb95d7a6f0d4b3e7379a57b71e0e5a5172c.exe
-
Size
8KB
-
MD5
5e6da43947921af1191ee20989e76148
-
SHA1
3f787194971b79b296725aeffa1a97339231f3cc
-
SHA256
03334d2fa2c403d6577069b8987addb95d7a6f0d4b3e7379a57b71e0e5a5172c
-
SHA512
5cd86372652374bda615e1e8897db7ac6724ddf371601a793e356bc3763d2c2b1bb53115d56d1953071427e8284ea3f74fa6d5e77de205de26c13a46332eb3e0
-
SSDEEP
96:1YjX/l8Dn4qwuK/ncVqZ790AvKn6riLNQ+e3q5dNtosZ2Y843TWVWe16GRlLtfUb:2jCDn+nAK9/vkvWHqzL3aVPDREFKin
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 6 3104 cscript.exe 9 3104 cscript.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\Control Panel\International\Geo\Nation 03334d2fa2c403d6577069b8987addb95d7a6f0d4b3e7379a57b71e0e5a5172c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 6 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 9 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3104 cscript.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2124 wrote to memory of 3104 2124 03334d2fa2c403d6577069b8987addb95d7a6f0d4b3e7379a57b71e0e5a5172c.exe 86 PID 2124 wrote to memory of 3104 2124 03334d2fa2c403d6577069b8987addb95d7a6f0d4b3e7379a57b71e0e5a5172c.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\03334d2fa2c403d6577069b8987addb95d7a6f0d4b3e7379a57b71e0e5a5172c.exe"C:\Users\Admin\AppData\Local\Temp\03334d2fa2c403d6577069b8987addb95d7a6f0d4b3e7379a57b71e0e5a5172c.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\System32\cscript.exe"C:\Windows\System32\cscript.exe" C:\Users\Admin\AppData\Local\Tempvermin.vbs2⤵
- Blocklisted process makes network request
- Suspicious use of FindShellTrayWindow
PID:3104
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.2MB
MD510d8745503700fbb314af537af37e45a
SHA194dc286a4c3485f76f78ec73384d292494107c28
SHA25634dc7ec918fb983b250c3edc294325b3e6e8702a93c0ea53df8c679523fc3777
SHA5123535b92b68bd51bfac4e445ae679ce3ec572970a0da4c6f7ca9b85bf8a9d6fcc9b18510affda7f53744f389f01a7b5e0e0187f7d93f20fbb9b12227caa52498f
-
Filesize
1022B
MD5be0465d478d6de4f33444a26c817f3c0
SHA1a36cf4f4f7e31317ce3c99c8cb01b6ec312618e4
SHA25622969b4b10e73229da4d65b1481c00950b1167d50269d60d9c2bab0dac74ea14
SHA512d57eb272c2fe5a64009b171fdaa31c37f806ecb35eab931e0a9ce1a4deb1a860ef50a3e48c6d943b716d7f007fd0959bf0eb9047faed9e861d863bc0a0ff3b0a