Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    28/04/2024, 03:15

General

  • Target

    92519d2aabff8050f1204a3bb284df2f72c5575308b72fd193dd78ea03d783cb.exe

  • Size

    1.1MB

  • MD5

    e76a3d23e4b6010ac93f4d35d59bbce4

  • SHA1

    667702f65b34fe98af83d2fbd09b70f80ca6dc90

  • SHA256

    92519d2aabff8050f1204a3bb284df2f72c5575308b72fd193dd78ea03d783cb

  • SHA512

    d9bda616f5bcae81c930b33057d5ab9b536b53b76ffd9b1e3731d82fa16583072ebdc45844fd27d29257270279e6c93ca319b6022acba04b6548060d79aa51f5

  • SSDEEP

    24576:CH0dl8myX9Bg42QoXFkrzkmmlSgRDko0lG4Z8r7Qfbkiu5Qg:CcaClSFlG4ZM7QzMn

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 14 IoCs
  • Loads dropped DLL 22 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 30 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\92519d2aabff8050f1204a3bb284df2f72c5575308b72fd193dd78ea03d783cb.exe
    "C:\Users\Admin\AppData\Local\Temp\92519d2aabff8050f1204a3bb284df2f72c5575308b72fd193dd78ea03d783cb.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2780
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2476
      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
        3⤵
        • Deletes itself
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2508
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
          4⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2988
          • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1632
            • C:\Windows\SysWOW64\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
              6⤵
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:1724
              • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:620
                • C:\Windows\SysWOW64\WScript.exe
                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                  8⤵
                  • Loads dropped DLL
                  • Suspicious use of WriteProcessMemory
                  PID:1148
                  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                    "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                    9⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    • Suspicious use of WriteProcessMemory
                    PID:1916
                    • C:\Windows\SysWOW64\WScript.exe
                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                      10⤵
                      • Loads dropped DLL
                      • Suspicious use of WriteProcessMemory
                      PID:2652
                      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                        "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                        11⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        • Suspicious use of WriteProcessMemory
                        PID:3052
                        • C:\Windows\SysWOW64\WScript.exe
                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                          12⤵
                            PID:2320
                        • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                          "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                          11⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          • Suspicious use of WriteProcessMemory
                          PID:2228
                          • C:\Windows\SysWOW64\WScript.exe
                            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                            12⤵
                            • Loads dropped DLL
                            • Suspicious use of WriteProcessMemory
                            PID:1852
                            • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                              "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                              13⤵
                              • Executes dropped EXE
                              • Suspicious use of SetWindowsHookEx
                              • Suspicious use of WriteProcessMemory
                              PID:1980
                              • C:\Windows\SysWOW64\WScript.exe
                                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                14⤵
                                  PID:848
                              • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                13⤵
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                PID:2036
                                • C:\Windows\SysWOW64\WScript.exe
                                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                  14⤵
                                  • Loads dropped DLL
                                  PID:2452
                                  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                    "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                    15⤵
                                    • Executes dropped EXE
                                    • Suspicious use of SetWindowsHookEx
                                    PID:2448
                                    • C:\Windows\SysWOW64\WScript.exe
                                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                      16⤵
                                      • Loads dropped DLL
                                      PID:1364
                                      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                        "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                        17⤵
                                        • Executes dropped EXE
                                        • Suspicious use of SetWindowsHookEx
                                        PID:2508
                                        • C:\Windows\SysWOW64\WScript.exe
                                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                          18⤵
                                          • Loads dropped DLL
                                          PID:1880
                                          • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                            "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                            19⤵
                                            • Executes dropped EXE
                                            • Suspicious use of SetWindowsHookEx
                                            PID:320
                                            • C:\Windows\SysWOW64\WScript.exe
                                              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                              20⤵
                                              • Loads dropped DLL
                                              PID:2236
                                              • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                                "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                                21⤵
                                                • Executes dropped EXE
                                                • Suspicious use of SetWindowsHookEx
                                                PID:532
                                                • C:\Windows\SysWOW64\WScript.exe
                                                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                                  22⤵
                                                  • Loads dropped DLL
                                                  PID:1356
                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                                    "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                                    23⤵
                                                    • Executes dropped EXE
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:2836
                                                • C:\Windows\SysWOW64\WScript.exe
                                                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                                  22⤵
                                                  • Loads dropped DLL
                                                  PID:2644
                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                                    "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                                    23⤵
                                                    • Executes dropped EXE
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:2960

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\Microsoft\Config.ini

        Filesize

        92B

        MD5

        67b9b3e2ded7086f393ebbc36c5e7bca

        SHA1

        e6299d0450b9a92a18cc23b5704a2b475652c790

        SHA256

        44063c266686263f14cd2a83fee124fb3e61a9171a6aab69709464f49511011d

        SHA512

        826fbc9481f46b1ae3db828a665c55c349023caf563e6e8c17321f5f3af3e4c3914955db6f0eebfc6defe561315435d47310b4d0499ab9c2c85bb61264dedc09

      • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

        Filesize

        696B

        MD5

        99c6d3daae7cb362152020047cb956dc

        SHA1

        4d70b60a43d37fbfea1be333aad269606ae3d3a7

        SHA256

        b35a71753d085b170fca9949910d93671a298e1fcc05cf0cdff308dba4d12324

        SHA512

        37098e0594a21439720df6adc851063d275020c7a337326cf0f83c8fce79ac210bd42c5458e49e560c4641b569be88b34ee5ee99dccba5c2655fee127c21e110

      • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

        Filesize

        696B

        MD5

        7f92a34f71720b04d60028801eb07932

        SHA1

        1701bae49609dc0ad1ab56823ae2414fd6c286c5

        SHA256

        b7445df62a392850e8ed07fba398dd5896625b6bcd694dfb5a02797ca2c637ee

        SHA512

        f5173fb410530956a6fcc8a15894c4186ae7fbac8e408714143359b476a2a2b1bd528cdb2e4647d1c16b99f108e452fb4fcb0a6db5eae6750fc6f6d8edd85360

      • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

        Filesize

        753B

        MD5

        162a09cb8db9843f4c3f5687c5607c2a

        SHA1

        2f8b9ab999a127ba6c38eb339cced24d299ddd02

        SHA256

        d412a2eae597883529909ce72470b47d36747cde51cc88468288d523a619c951

        SHA512

        c0c40ca062f5b69a4f0993e0c6cd921fb1e605d673d5a8654fd516095c7f25190a181d139a41e17b44f28ad0a802d7c7ad692f1ad0436663a633a1ef7c55e403

      • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

        Filesize

        696B

        MD5

        a66ca64afe431b7c50358bd05ba54e34

        SHA1

        f34d905ac06b3c07f936352bff4db70469f5057c

        SHA256

        3a2a423d9df888fadef3786fdbf7fb0125eb8e1d08b22a707b6efa4bc00b7f43

        SHA512

        90ea8413b1fce013f8e902e0e3efbbfd1ec30c7f26ca2fb05e390a847d22a1181eeb60dccf6e3f8fec5aeff2568506977ab47018a54d328078ab14407f3eeb09

      • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

        Filesize

        696B

        MD5

        cd3670279cfd4857ab7ae976f56ad473

        SHA1

        2b4136cb5f5aa98e7cf48135db771fe497da942f

        SHA256

        9824342f00af60b70c73fd0b0b08c54f1439d6f6964ce1286a7eec748047041f

        SHA512

        30e7536c3209027ad3df30edd10d69b666a936c4184f3ad26ebf683ae2d066607b9eda521955af0a3cb235d6d84cc5c6fda747525bef19ec3a5016db66945889

      • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

        Filesize

        696B

        MD5

        0192d17fea0102bde8e142aabd30379e

        SHA1

        f625075beef58c06ca68d43a3ba5cc1caa8efdfd

        SHA256

        98e8ea7a93d93f491f56d4026b5683e7fdeff25fe26f518e2e81a1319ef49719

        SHA512

        43002329c61c0fedc908a1838c1868573a5f6f64b4bad3295182b341562cd4b17710ce021e75157830b5b29d29141ae394b3addae4f8c180259f02cb44648163

      • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

        Filesize

        696B

        MD5

        7c7211c6ab078878929bb3683f705560

        SHA1

        5a52049f54692294392837b5922d865e9c407022

        SHA256

        bb9e2a89c0fc9574eac35f2b2c4bc696f3642fc96ff2fd1f6a2d3467784fbeff

        SHA512

        4d9b5d0053b0f57651c08084c87416d2ae8613b9ea74651e51f251e5d806f36c194735e4f6f3152d7c72592f60f2a7e971ee82c60410762472942823b1956c38

      • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

        Filesize

        696B

        MD5

        e94e88174ec781f873054a1341dde3c1

        SHA1

        1bfcc1fd57262661e3e17db7f582004d481e95d9

        SHA256

        83a3606b4d4b48761b768ff2bd5668a599025f46b5d31b73bd0b014f6f95e225

        SHA512

        10dd4c89ea250920267a33317f693093471b805e33f18b38ffd7e3b9fb12624047f6bca7c82b0a2c83a3d6cead4d289f3da723b249a7ab6a9c40b339977fe7f6

      • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

        Filesize

        696B

        MD5

        28167c064311357a30cc6de51b34120d

        SHA1

        cd6e8343bf5fa014ded5905fd8c6037eda277818

        SHA256

        e1a76a59c230fb740b85443e95d9db97f660e6d57f8f79060c51d3fb21f7af2a

        SHA512

        a8ca9a0804c9cb2c87148d82b2ffb169d766b6ea91b4106363b24d555c9a58594915364b6cb61a1757723e96f7095f06859ab83a6e1055d43c8e78e9b52c8b57

      • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

        Filesize

        696B

        MD5

        840853c0aa5a4d702a8110a0cb763b4b

        SHA1

        58d028e09818c3fd2a9d521c26772cf4d1a9072a

        SHA256

        4438df44bf53668a332407b1c60d745bd1293a3f1acab9953b1d77e5131d2728

        SHA512

        f2b044e4710dadb03164bc78519207bd8d39d2cf9d4568fc11c38271eabc3e57410083b1cf29e40b1f6119ffa33ed4784ef652f112e50b554c2983755a606b6a

      • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

        Filesize

        696B

        MD5

        780c5b88f55c3463a252f361d53f98db

        SHA1

        244e739c7401ce41027d7786f4a48f4806a9939b

        SHA256

        d8b383df125f83a39c299a3134c88e981cf47755ddd6b44310f70231305c6bb0

        SHA512

        b12e3266edea4f9dff105ed8617c81a29f9873d646b6b326c5c29c0c590049dd85458b8ff7541957f9ab995896e7bfd08b171959e592ccc6edbedf998fdf1045

      • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

        Filesize

        696B

        MD5

        067a3458406fce1e0caec803b21a2c58

        SHA1

        1277d2a3236100a0758d4f4f279cd02d537e626b

        SHA256

        35c0d5d7757b50c61a708107c8e2ab5df872fdc25516f8003d9d58d3ae5ec9e3

        SHA512

        99918a35f93140231d63a17c97bb9ef66a5744dc044c7e48034c3d2fcc49c3b97fe0d37a32ae6307a7b7e772b8016a6727672d2844b5ed7dcf20c31dd01724e4

      • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

        Filesize

        696B

        MD5

        df56efc5aa49720056952b653a76a0d1

        SHA1

        82823a83837e69b031a973238d78e0360d113ac7

        SHA256

        bd6fdd2db5dd3828baa84352f1c382304ce0481755f000a7445e3977c24d0a35

        SHA512

        ffd2ffc465dcd33cca7fdf4cce8711ce7a5cb6af0933fbf2885b7b4164ea2c19ec1a776f2422996599e28b05a3ff927dd76221b9b4dec49b942941b48962034c

      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

        Filesize

        1.1MB

        MD5

        7924417576479f6f200e51b5ef9a3b38

        SHA1

        2cc256f3ee2b19d5396319a652f970ba55015d3c

        SHA256

        0740cd8b3152e08cb73ad8ecdbfb6fd01c412994273b35c883a2fe1706fc0b73

        SHA512

        3b8681a91749334b9c16d09d3447f2317623b65188775a41703e189a0008b7c6b6f2a90c5718d5fd035ae6c88ca3745a5a7d9fc86b563b78eb8d328dff10c32b

      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

        Filesize

        1.1MB

        MD5

        3618f5466bbd98f6aad54ca23ca4077e

        SHA1

        14f8cadfc18b0bd2e8e2a341078b4f846d9d447e

        SHA256

        2798aee2e7e804f07e3deecdfb74a1a0e8c4dd57936324823d196d668037db26

        SHA512

        e6e8540426b879b6fddee2b0d8232f30e545d618d16b789a67b534acfec682d9edddfade442ae1bb376bc94d589f64a451186aa0c6ca5d6ce1d2b6ef4e63fa44

      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

        Filesize

        1.1MB

        MD5

        9cec6c11d26400bc2c5130e00d6595db

        SHA1

        6e48d33b06bed996077d2310a8269f54a527f098

        SHA256

        01f77eaf89470e4ced55e1e1e473db18d718e02cdec235a13b2e9c9f4b01926f

        SHA512

        82b3a2736af397d8121d03f597f7dd56d29c3309c3a8c85569066c6d783562cae1e8b170ff6891ece4d74d339817a4fbfd3cfbb24284ead12edaf5d746e00fcf

      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

        Filesize

        1.1MB

        MD5

        0fc730b94d5448ddb7e69f239e3e6ba3

        SHA1

        5c334e52892e94c92674ced8ffbfab51b87b3cbf

        SHA256

        157158980b5d974e3a3aceb22ca0df65508ba62e1e3802292d270a6f7696edc0

        SHA512

        056f975e97772b5de13906ae1679f775febc03412f9a38ae0a0fa765337587a1c35d848b2261470bb58235f13f4bf0edb2d3da7349ca4b526de629a1fafef7fe

      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

        Filesize

        1.1MB

        MD5

        12ae0297816e9acd4685d381d60977e0

        SHA1

        3ce604eee36ec40ddd2b7451111733c11791009c

        SHA256

        7d1474e59268961dee742f70763f2f615dd33fe0b4a54a0d0fa458155e5e767d

        SHA512

        abd4ff99df2b1ce4f156ea6122cf3f988b2c604db484f7e6498b42575acc7ffebccc4d67cb5529e6a6eb0faadd5adfa24920f5a7b4fb6b79ff2e950865a402b6

      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

        Filesize

        1.1MB

        MD5

        cd50f3e49f49ff39f3eb89d9cd7f53b7

        SHA1

        12f08f2ac2c36f00597b00cfc0f4d5952b7c2c09

        SHA256

        2d77667beabd2c07c9269c84b4593064c6f62342071ec31a55b2bb0236a92c49

        SHA512

        d62b9e470bb7511c3b15c658cd4e0a29ca493912cf92e5996f95b8bdeb503133568d299512961601146b4cc257837b75b90308d81739de5760ba39b130e76e29

      • memory/2780-8-0x0000000000400000-0x0000000000551000-memory.dmp

        Filesize

        1.3MB