Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/04/2024, 18:24

General

  • Target

    03334d2fa2c403d6577069b8987addb95d7a6f0d4b3e7379a57b71e0e5a5172c.exe

  • Size

    8KB

  • MD5

    5e6da43947921af1191ee20989e76148

  • SHA1

    3f787194971b79b296725aeffa1a97339231f3cc

  • SHA256

    03334d2fa2c403d6577069b8987addb95d7a6f0d4b3e7379a57b71e0e5a5172c

  • SHA512

    5cd86372652374bda615e1e8897db7ac6724ddf371601a793e356bc3763d2c2b1bb53115d56d1953071427e8284ea3f74fa6d5e77de205de26c13a46332eb3e0

  • SSDEEP

    96:1YjX/l8Dn4qwuK/ncVqZ790AvKn6riLNQ+e3q5dNtosZ2Y843TWVWe16GRlLtfUb:2jCDn+nAK9/vkvWHqzL3aVPDREFKin

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Script User-Agent 2 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\03334d2fa2c403d6577069b8987addb95d7a6f0d4b3e7379a57b71e0e5a5172c.exe
    "C:\Users\Admin\AppData\Local\Temp\03334d2fa2c403d6577069b8987addb95d7a6f0d4b3e7379a57b71e0e5a5172c.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2124
    • C:\Windows\System32\cscript.exe
      "C:\Windows\System32\cscript.exe" C:\Users\Admin\AppData\Local\Tempvermin.vbs
      2⤵
      • Blocklisted process makes network request
      • Suspicious use of FindShellTrayWindow
      PID:3104

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\test.zip

          Filesize

          3.2MB

          MD5

          10d8745503700fbb314af537af37e45a

          SHA1

          94dc286a4c3485f76f78ec73384d292494107c28

          SHA256

          34dc7ec918fb983b250c3edc294325b3e6e8702a93c0ea53df8c679523fc3777

          SHA512

          3535b92b68bd51bfac4e445ae679ce3ec572970a0da4c6f7ca9b85bf8a9d6fcc9b18510affda7f53744f389f01a7b5e0e0187f7d93f20fbb9b12227caa52498f

        • C:\Users\Admin\AppData\Local\Tempvermin.vbs

          Filesize

          1022B

          MD5

          be0465d478d6de4f33444a26c817f3c0

          SHA1

          a36cf4f4f7e31317ce3c99c8cb01b6ec312618e4

          SHA256

          22969b4b10e73229da4d65b1481c00950b1167d50269d60d9c2bab0dac74ea14

          SHA512

          d57eb272c2fe5a64009b171fdaa31c37f806ecb35eab931e0a9ce1a4deb1a860ef50a3e48c6d943b716d7f007fd0959bf0eb9047faed9e861d863bc0a0ff3b0a

        • memory/2124-0-0x0000000000110000-0x0000000000118000-memory.dmp

          Filesize

          32KB

        • memory/2124-2-0x00007FFB74CA0000-0x00007FFB75761000-memory.dmp

          Filesize

          10.8MB

        • memory/2124-194-0x00007FFB74CA0000-0x00007FFB75761000-memory.dmp

          Filesize

          10.8MB