Analysis

  • max time kernel
    135s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/05/2024, 00:18

General

  • Target

    39f591ad18b433b8e54686b2deb9b18361b6e179b0b95cc531142cdd324499a6.exe

  • Size

    1.1MB

  • MD5

    e344cc141c19f4d441db280419b2be1e

  • SHA1

    0bd60f659206214d5e3af86f0dcae0fad65a3126

  • SHA256

    39f591ad18b433b8e54686b2deb9b18361b6e179b0b95cc531142cdd324499a6

  • SHA512

    263d5cd45acf6fe39abdb394eb600d1b2fc230c89151303e5eb1478460bdfe3c4d4ade6d4baf3544739505034d7577d06c4f5619d219d6fcf207adc95e9060c3

  • SSDEEP

    24576:aH0dl8myX9Bg42QoXFkrzkmplSgRDYo0lG4Z8r7Qfbkiu5Qc:acallSllG4ZM7QzM7

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 13 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 13 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 16 IoCs
  • Suspicious use of WriteProcessMemory 45 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\39f591ad18b433b8e54686b2deb9b18361b6e179b0b95cc531142cdd324499a6.exe
    "C:\Users\Admin\AppData\Local\Temp\39f591ad18b433b8e54686b2deb9b18361b6e179b0b95cc531142cdd324499a6.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1936
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
      2⤵
      • Checks computer location settings
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:944
      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
        3⤵
        • Checks computer location settings
        • Deletes itself
        • Executes dropped EXE
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4460
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
          4⤵
          • Checks computer location settings
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:2328
          • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Modifies registry class
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:4088
            • C:\Windows\SysWOW64\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
              6⤵
                PID:3816
              • C:\Windows\SysWOW64\WScript.exe
                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                6⤵
                • Checks computer location settings
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:5000
                • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                  "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                  7⤵
                  • Checks computer location settings
                  • Executes dropped EXE
                  • Modifies registry class
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:3360
                  • C:\Windows\SysWOW64\WScript.exe
                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                    8⤵
                    • Checks computer location settings
                    • Modifies registry class
                    • Suspicious use of WriteProcessMemory
                    PID:2360
                    • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                      "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                      9⤵
                      • Checks computer location settings
                      • Executes dropped EXE
                      • Modifies registry class
                      • Suspicious use of SetWindowsHookEx
                      • Suspicious use of WriteProcessMemory
                      PID:3084
                      • C:\Windows\SysWOW64\WScript.exe
                        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                        10⤵
                        • Checks computer location settings
                        • Modifies registry class
                        • Suspicious use of WriteProcessMemory
                        PID:3280
                        • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                          "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                          11⤵
                          • Checks computer location settings
                          • Executes dropped EXE
                          • Modifies registry class
                          • Suspicious use of SetWindowsHookEx
                          • Suspicious use of WriteProcessMemory
                          PID:4120
                          • C:\Windows\SysWOW64\WScript.exe
                            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                            12⤵
                            • Checks computer location settings
                            • Modifies registry class
                            • Suspicious use of WriteProcessMemory
                            PID:4856
                            • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                              "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                              13⤵
                              • Executes dropped EXE
                              • Suspicious use of SetWindowsHookEx
                              PID:712
                          • C:\Windows\SysWOW64\WScript.exe
                            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                            12⤵
                            • Checks computer location settings
                            • Modifies registry class
                            • Suspicious use of WriteProcessMemory
                            PID:1424
                            • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                              "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                              13⤵
                              • Executes dropped EXE
                              • Suspicious use of SetWindowsHookEx
                              PID:3080

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Config.ini

      Filesize

      92B

      MD5

      67b9b3e2ded7086f393ebbc36c5e7bca

      SHA1

      e6299d0450b9a92a18cc23b5704a2b475652c790

      SHA256

      44063c266686263f14cd2a83fee124fb3e61a9171a6aab69709464f49511011d

      SHA512

      826fbc9481f46b1ae3db828a665c55c349023caf563e6e8c17321f5f3af3e4c3914955db6f0eebfc6defe561315435d47310b4d0499ab9c2c85bb61264dedc09

    • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

      Filesize

      753B

      MD5

      67889d7fa95cd27fea088b702f291ca6

      SHA1

      2583d21f1882abf07f02a05f71da17785b35afa3

      SHA256

      d109f25cbd4c0e05dd7b857cb311376249758333c159fd8315bca16830091c1c

      SHA512

      b2c0fcf4675a4b90a7cbe4d7558400a49d44d004179f90b96e723a027dfa0f3997bb99fd743abe0d127a9abd3adae6ac71be2b9c21c1bf538b2b9999cff17d69

    • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

      Filesize

      696B

      MD5

      41bdc303960afcda8ebae4f3e29f0b52

      SHA1

      4cbf649fb04c836614138308a06ecd48dcb2882d

      SHA256

      da674cdbd4dd762cc32ce0bd2ec36929a626e0e87f7ab7a4a1b1e1ce0123d999

      SHA512

      800b5b01cc41e7633f203579e7f6ec0a9f6408f7af79dcfa74596be9264dbb8baade6b1439dedb5194496aa27b8b0e2680ce65ad91032138ea0ac2c8a0872cf1

    • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

      Filesize

      696B

      MD5

      067a3458406fce1e0caec803b21a2c58

      SHA1

      1277d2a3236100a0758d4f4f279cd02d537e626b

      SHA256

      35c0d5d7757b50c61a708107c8e2ab5df872fdc25516f8003d9d58d3ae5ec9e3

      SHA512

      99918a35f93140231d63a17c97bb9ef66a5744dc044c7e48034c3d2fcc49c3b97fe0d37a32ae6307a7b7e772b8016a6727672d2844b5ed7dcf20c31dd01724e4

    • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

      Filesize

      696B

      MD5

      1a94fff9bade36e4d067e0fcefb1a8f5

      SHA1

      1713c3fc499a56cd97035e44405e0b5e1a0a586b

      SHA256

      1977a5ac15e88252efdd11b9aace6de92383e71132a94273b0e890e92ae91048

      SHA512

      89a7dd6811f9491a14bf49f1cbce3e869107d2e0d410fa3d3c867ce68d573d6f8e6ada98ac3635fc620c96c61676b5cef2563b5fbea14f617c1fa61bce4f3ac7

    • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

      Filesize

      696B

      MD5

      619955d43a58558c766025119a5a66cb

      SHA1

      cfb43d2b9cb68699667ca8d4929e71b25ed115ab

      SHA256

      a129bff17a859b7b2d6681f519c985c661797dd508ac249d30f02a0a78858cee

      SHA512

      20f9499cddf2fb824365830736255a1dce689da0e94fa8e999ee4e28883e65637410710ea01204b5f3d48213f697461288da2b7a535511da87f848b1e6e83bc6

    • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

      Filesize

      696B

      MD5

      55765ba68da8820ee35d2d4d1dedeac0

      SHA1

      19f5f147056f3d837a11d6b08a7fc9544f9927f6

      SHA256

      1eb237d283717ac45bdfef217d3d09fb4ef73db3838859057c94e488b329c522

      SHA512

      61b6361b8dfef2067016c50e830db1fc768d0654a3f643cf4b4cb1193de722f74401e73f719d8cff5a443058adfa7e3cd0dfc502f25dd249cdc36a7056c81c18

    • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

      Filesize

      1.1MB

      MD5

      2ec0c1893cc0d585421d932506fdf6e8

      SHA1

      87a7fb52c42a5ac6e4ac17b8d74c571b6b6a5a05

      SHA256

      e038c102e8061b47813d82d5a63bf32db554a34212b09ced8031bc1eb4dd8fca

      SHA512

      8b9a38c045ba6e6cc9ce168ae5b3e57dba71a601c899dd7f5787fa72157ad898eb227176feabf4aace626400fcbe48f3f2e86e656e193544cbd7292d7940f530

    • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

      Filesize

      1.1MB

      MD5

      c9cc74d37cd5088900ac4569243736ca

      SHA1

      a3a2f58a75344071dee96e5e600692b1ee30b400

      SHA256

      405ae227253561022ca53279fd990d76d06213398aaf7765668a5c1b50ad549b

      SHA512

      962c7bb49fe7f11b53ebc93cf40e5cf5c6ef82d1738eb7a3b1adbe805668427b81bff8a3d99fdbbf85ebf97daff6aa1069251d4b54f2056d4fe5f63411b2e6ff

    • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

      Filesize

      1.1MB

      MD5

      85d70b7f584bfd274fb45deeb3983951

      SHA1

      d5443ac9483322ae8900b8b8a7b768ad6111723f

      SHA256

      0b7bfba952e8d7f10f8e4fef0b17db720ea8272556fba38b5ba4f05efbd895db

      SHA512

      41d9ff388bce9ab14c2a3c5d6466ba59f1b78935fad982a43c581d04d077f25364bf4c4f3e2ddbb5a23e4f83247d74505e67817fc2c2de1c37422051ab6d5e6c

    • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

      Filesize

      1.1MB

      MD5

      bb553e07c7518bb248a7ecfb4f0cfcd1

      SHA1

      0744f356e06e7e530d4d640aa64e5d951232e6ca

      SHA256

      8e963833d1b883e107bb7ffafe7e9afc69f10953f9bb17a64a040f05ab49bd39

      SHA512

      7a7c8653435291d34c13f57137db1395857a50b8c32ed234342080b01fcea9cc8a04a1ddafb02a0c6e35ee804c78e03877e6f1ce1a30e56486979f215505b3bb

    • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

      Filesize

      1.1MB

      MD5

      39e6c17236245efd682938eae6e893bc

      SHA1

      44eb2d96024e53cfbe00d4937c5a9e2f7b5316b0

      SHA256

      5a02dfdf05dc3e08237d7e4f630c39c76efa8e08e9812cd4c47d58f5c1d736f1

      SHA512

      c814ed4a550b9d94386b17db38e51d3d7d000757c7dd44629d99626ee1e2160c930fdfc140947e8991db838b8a21125746e25098ab161419558d91c06de59d3e

    • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

      Filesize

      1.1MB

      MD5

      23847388136d93e408f8e9280871a8df

      SHA1

      ab1308342aa17beaeccce2db1c51124261589f68

      SHA256

      ed79a8707e223ab1e912b81a025d01aefcf06478eb96ca2084aded9b89407cd6

      SHA512

      a42b2854ea959a1d59ebf29697c5c57e723bab27d6c9dde8d5d12de17836d3776572dd7a95554a126e8cd4793527b4fd8befafa1bf8467bb1deb04fd5501aec0

    • memory/712-71-0x0000000000400000-0x000000000055F000-memory.dmp

      Filesize

      1.4MB

    • memory/712-73-0x0000000000400000-0x000000000055F000-memory.dmp

      Filesize

      1.4MB

    • memory/1936-0-0x0000000000400000-0x000000000055F000-memory.dmp

      Filesize

      1.4MB

    • memory/1936-9-0x0000000000400000-0x000000000055F000-memory.dmp

      Filesize

      1.4MB

    • memory/3080-72-0x0000000000400000-0x000000000055F000-memory.dmp

      Filesize

      1.4MB

    • memory/3084-55-0x0000000000400000-0x000000000055F000-memory.dmp

      Filesize

      1.4MB

    • memory/3360-36-0x0000000000400000-0x000000000055F000-memory.dmp

      Filesize

      1.4MB

    • memory/3360-44-0x0000000000400000-0x000000000055F000-memory.dmp

      Filesize

      1.4MB

    • memory/4088-33-0x0000000000400000-0x000000000055F000-memory.dmp

      Filesize

      1.4MB

    • memory/4088-23-0x0000000000400000-0x000000000055F000-memory.dmp

      Filesize

      1.4MB

    • memory/4120-67-0x0000000000400000-0x000000000055F000-memory.dmp

      Filesize

      1.4MB

    • memory/4460-20-0x0000000000400000-0x000000000055F000-memory.dmp

      Filesize

      1.4MB