Analysis
-
max time kernel
135s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
20/05/2024, 00:18
Static task
static1
Behavioral task
behavioral1
Sample
39f591ad18b433b8e54686b2deb9b18361b6e179b0b95cc531142cdd324499a6.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
39f591ad18b433b8e54686b2deb9b18361b6e179b0b95cc531142cdd324499a6.exe
Resource
win10v2004-20240426-en
General
-
Target
39f591ad18b433b8e54686b2deb9b18361b6e179b0b95cc531142cdd324499a6.exe
-
Size
1.1MB
-
MD5
e344cc141c19f4d441db280419b2be1e
-
SHA1
0bd60f659206214d5e3af86f0dcae0fad65a3126
-
SHA256
39f591ad18b433b8e54686b2deb9b18361b6e179b0b95cc531142cdd324499a6
-
SHA512
263d5cd45acf6fe39abdb394eb600d1b2fc230c89151303e5eb1478460bdfe3c4d4ade6d4baf3544739505034d7577d06c4f5619d219d6fcf207adc95e9060c3
-
SSDEEP
24576:aH0dl8myX9Bg42QoXFkrzkmplSgRDYo0lG4Z8r7Qfbkiu5Qc:acallSllG4ZM7QzM7
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 13 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation 39f591ad18b433b8e54686b2deb9b18361b6e179b0b95cc531142cdd324499a6.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation svchcst.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation svchcst.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation svchcst.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation svchcst.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation svchcst.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation WScript.exe -
Deletes itself 1 IoCs
pid Process 4460 svchcst.exe -
Executes dropped EXE 7 IoCs
pid Process 4460 svchcst.exe 4088 svchcst.exe 3360 svchcst.exe 3084 svchcst.exe 4120 svchcst.exe 712 svchcst.exe 3080 svchcst.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 13 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000_Classes\Local Settings svchcst.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000_Classes\Local Settings svchcst.exe Key created \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000_Classes\Local Settings svchcst.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000_Classes\Local Settings 39f591ad18b433b8e54686b2deb9b18361b6e179b0b95cc531142cdd324499a6.exe Key created \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000_Classes\Local Settings svchcst.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000_Classes\Local Settings svchcst.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1936 39f591ad18b433b8e54686b2deb9b18361b6e179b0b95cc531142cdd324499a6.exe 1936 39f591ad18b433b8e54686b2deb9b18361b6e179b0b95cc531142cdd324499a6.exe 4460 svchcst.exe 4460 svchcst.exe 4460 svchcst.exe 4460 svchcst.exe 4460 svchcst.exe 4460 svchcst.exe 4460 svchcst.exe 4460 svchcst.exe 4460 svchcst.exe 4460 svchcst.exe 4460 svchcst.exe 4460 svchcst.exe 4460 svchcst.exe 4460 svchcst.exe 4460 svchcst.exe 4460 svchcst.exe 4460 svchcst.exe 4460 svchcst.exe 4460 svchcst.exe 4460 svchcst.exe 4460 svchcst.exe 4460 svchcst.exe 4460 svchcst.exe 4460 svchcst.exe 4460 svchcst.exe 4460 svchcst.exe 4460 svchcst.exe 4460 svchcst.exe 4460 svchcst.exe 4460 svchcst.exe 4460 svchcst.exe 4460 svchcst.exe 4460 svchcst.exe 4460 svchcst.exe 4460 svchcst.exe 4460 svchcst.exe 4460 svchcst.exe 4460 svchcst.exe 4460 svchcst.exe 4460 svchcst.exe 4460 svchcst.exe 4460 svchcst.exe 4460 svchcst.exe 4460 svchcst.exe 4460 svchcst.exe 4460 svchcst.exe 4460 svchcst.exe 4460 svchcst.exe 4460 svchcst.exe 4460 svchcst.exe 4460 svchcst.exe 4460 svchcst.exe 4460 svchcst.exe 4460 svchcst.exe 4460 svchcst.exe 4460 svchcst.exe 4460 svchcst.exe 4460 svchcst.exe 4460 svchcst.exe 4460 svchcst.exe 4460 svchcst.exe 4460 svchcst.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1936 39f591ad18b433b8e54686b2deb9b18361b6e179b0b95cc531142cdd324499a6.exe -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 1936 39f591ad18b433b8e54686b2deb9b18361b6e179b0b95cc531142cdd324499a6.exe 1936 39f591ad18b433b8e54686b2deb9b18361b6e179b0b95cc531142cdd324499a6.exe 4460 svchcst.exe 4460 svchcst.exe 4088 svchcst.exe 4088 svchcst.exe 3360 svchcst.exe 3360 svchcst.exe 3084 svchcst.exe 3084 svchcst.exe 4120 svchcst.exe 4120 svchcst.exe 712 svchcst.exe 712 svchcst.exe 3080 svchcst.exe 3080 svchcst.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 1936 wrote to memory of 944 1936 39f591ad18b433b8e54686b2deb9b18361b6e179b0b95cc531142cdd324499a6.exe 82 PID 1936 wrote to memory of 944 1936 39f591ad18b433b8e54686b2deb9b18361b6e179b0b95cc531142cdd324499a6.exe 82 PID 1936 wrote to memory of 944 1936 39f591ad18b433b8e54686b2deb9b18361b6e179b0b95cc531142cdd324499a6.exe 82 PID 944 wrote to memory of 4460 944 WScript.exe 94 PID 944 wrote to memory of 4460 944 WScript.exe 94 PID 944 wrote to memory of 4460 944 WScript.exe 94 PID 4460 wrote to memory of 2328 4460 svchcst.exe 95 PID 4460 wrote to memory of 2328 4460 svchcst.exe 95 PID 4460 wrote to memory of 2328 4460 svchcst.exe 95 PID 2328 wrote to memory of 4088 2328 WScript.exe 98 PID 2328 wrote to memory of 4088 2328 WScript.exe 98 PID 2328 wrote to memory of 4088 2328 WScript.exe 98 PID 4088 wrote to memory of 3816 4088 svchcst.exe 99 PID 4088 wrote to memory of 3816 4088 svchcst.exe 99 PID 4088 wrote to memory of 3816 4088 svchcst.exe 99 PID 4088 wrote to memory of 5000 4088 svchcst.exe 100 PID 4088 wrote to memory of 5000 4088 svchcst.exe 100 PID 4088 wrote to memory of 5000 4088 svchcst.exe 100 PID 5000 wrote to memory of 3360 5000 WScript.exe 101 PID 5000 wrote to memory of 3360 5000 WScript.exe 101 PID 5000 wrote to memory of 3360 5000 WScript.exe 101 PID 3360 wrote to memory of 2360 3360 svchcst.exe 102 PID 3360 wrote to memory of 2360 3360 svchcst.exe 102 PID 3360 wrote to memory of 2360 3360 svchcst.exe 102 PID 2360 wrote to memory of 3084 2360 WScript.exe 103 PID 2360 wrote to memory of 3084 2360 WScript.exe 103 PID 2360 wrote to memory of 3084 2360 WScript.exe 103 PID 3084 wrote to memory of 3280 3084 svchcst.exe 104 PID 3084 wrote to memory of 3280 3084 svchcst.exe 104 PID 3084 wrote to memory of 3280 3084 svchcst.exe 104 PID 3280 wrote to memory of 4120 3280 WScript.exe 106 PID 3280 wrote to memory of 4120 3280 WScript.exe 106 PID 3280 wrote to memory of 4120 3280 WScript.exe 106 PID 4120 wrote to memory of 4856 4120 svchcst.exe 107 PID 4120 wrote to memory of 4856 4120 svchcst.exe 107 PID 4120 wrote to memory of 4856 4120 svchcst.exe 107 PID 4120 wrote to memory of 1424 4120 svchcst.exe 108 PID 4120 wrote to memory of 1424 4120 svchcst.exe 108 PID 4120 wrote to memory of 1424 4120 svchcst.exe 108 PID 4856 wrote to memory of 712 4856 WScript.exe 110 PID 4856 wrote to memory of 712 4856 WScript.exe 110 PID 4856 wrote to memory of 712 4856 WScript.exe 110 PID 1424 wrote to memory of 3080 1424 WScript.exe 111 PID 1424 wrote to memory of 3080 1424 WScript.exe 111 PID 1424 wrote to memory of 3080 1424 WScript.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\39f591ad18b433b8e54686b2deb9b18361b6e179b0b95cc531142cdd324499a6.exe"C:\Users\Admin\AppData\Local\Temp\39f591ad18b433b8e54686b2deb9b18361b6e179b0b95cc531142cdd324499a6.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"4⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"6⤵PID:3816
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"6⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"8⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3084 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"10⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3280 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"11⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"12⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"13⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:712
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"12⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"13⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3080
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92B
MD567b9b3e2ded7086f393ebbc36c5e7bca
SHA1e6299d0450b9a92a18cc23b5704a2b475652c790
SHA25644063c266686263f14cd2a83fee124fb3e61a9171a6aab69709464f49511011d
SHA512826fbc9481f46b1ae3db828a665c55c349023caf563e6e8c17321f5f3af3e4c3914955db6f0eebfc6defe561315435d47310b4d0499ab9c2c85bb61264dedc09
-
Filesize
753B
MD567889d7fa95cd27fea088b702f291ca6
SHA12583d21f1882abf07f02a05f71da17785b35afa3
SHA256d109f25cbd4c0e05dd7b857cb311376249758333c159fd8315bca16830091c1c
SHA512b2c0fcf4675a4b90a7cbe4d7558400a49d44d004179f90b96e723a027dfa0f3997bb99fd743abe0d127a9abd3adae6ac71be2b9c21c1bf538b2b9999cff17d69
-
Filesize
696B
MD541bdc303960afcda8ebae4f3e29f0b52
SHA14cbf649fb04c836614138308a06ecd48dcb2882d
SHA256da674cdbd4dd762cc32ce0bd2ec36929a626e0e87f7ab7a4a1b1e1ce0123d999
SHA512800b5b01cc41e7633f203579e7f6ec0a9f6408f7af79dcfa74596be9264dbb8baade6b1439dedb5194496aa27b8b0e2680ce65ad91032138ea0ac2c8a0872cf1
-
Filesize
696B
MD5067a3458406fce1e0caec803b21a2c58
SHA11277d2a3236100a0758d4f4f279cd02d537e626b
SHA25635c0d5d7757b50c61a708107c8e2ab5df872fdc25516f8003d9d58d3ae5ec9e3
SHA51299918a35f93140231d63a17c97bb9ef66a5744dc044c7e48034c3d2fcc49c3b97fe0d37a32ae6307a7b7e772b8016a6727672d2844b5ed7dcf20c31dd01724e4
-
Filesize
696B
MD51a94fff9bade36e4d067e0fcefb1a8f5
SHA11713c3fc499a56cd97035e44405e0b5e1a0a586b
SHA2561977a5ac15e88252efdd11b9aace6de92383e71132a94273b0e890e92ae91048
SHA51289a7dd6811f9491a14bf49f1cbce3e869107d2e0d410fa3d3c867ce68d573d6f8e6ada98ac3635fc620c96c61676b5cef2563b5fbea14f617c1fa61bce4f3ac7
-
Filesize
696B
MD5619955d43a58558c766025119a5a66cb
SHA1cfb43d2b9cb68699667ca8d4929e71b25ed115ab
SHA256a129bff17a859b7b2d6681f519c985c661797dd508ac249d30f02a0a78858cee
SHA51220f9499cddf2fb824365830736255a1dce689da0e94fa8e999ee4e28883e65637410710ea01204b5f3d48213f697461288da2b7a535511da87f848b1e6e83bc6
-
Filesize
696B
MD555765ba68da8820ee35d2d4d1dedeac0
SHA119f5f147056f3d837a11d6b08a7fc9544f9927f6
SHA2561eb237d283717ac45bdfef217d3d09fb4ef73db3838859057c94e488b329c522
SHA51261b6361b8dfef2067016c50e830db1fc768d0654a3f643cf4b4cb1193de722f74401e73f719d8cff5a443058adfa7e3cd0dfc502f25dd249cdc36a7056c81c18
-
Filesize
1.1MB
MD52ec0c1893cc0d585421d932506fdf6e8
SHA187a7fb52c42a5ac6e4ac17b8d74c571b6b6a5a05
SHA256e038c102e8061b47813d82d5a63bf32db554a34212b09ced8031bc1eb4dd8fca
SHA5128b9a38c045ba6e6cc9ce168ae5b3e57dba71a601c899dd7f5787fa72157ad898eb227176feabf4aace626400fcbe48f3f2e86e656e193544cbd7292d7940f530
-
Filesize
1.1MB
MD5c9cc74d37cd5088900ac4569243736ca
SHA1a3a2f58a75344071dee96e5e600692b1ee30b400
SHA256405ae227253561022ca53279fd990d76d06213398aaf7765668a5c1b50ad549b
SHA512962c7bb49fe7f11b53ebc93cf40e5cf5c6ef82d1738eb7a3b1adbe805668427b81bff8a3d99fdbbf85ebf97daff6aa1069251d4b54f2056d4fe5f63411b2e6ff
-
Filesize
1.1MB
MD585d70b7f584bfd274fb45deeb3983951
SHA1d5443ac9483322ae8900b8b8a7b768ad6111723f
SHA2560b7bfba952e8d7f10f8e4fef0b17db720ea8272556fba38b5ba4f05efbd895db
SHA51241d9ff388bce9ab14c2a3c5d6466ba59f1b78935fad982a43c581d04d077f25364bf4c4f3e2ddbb5a23e4f83247d74505e67817fc2c2de1c37422051ab6d5e6c
-
Filesize
1.1MB
MD5bb553e07c7518bb248a7ecfb4f0cfcd1
SHA10744f356e06e7e530d4d640aa64e5d951232e6ca
SHA2568e963833d1b883e107bb7ffafe7e9afc69f10953f9bb17a64a040f05ab49bd39
SHA5127a7c8653435291d34c13f57137db1395857a50b8c32ed234342080b01fcea9cc8a04a1ddafb02a0c6e35ee804c78e03877e6f1ce1a30e56486979f215505b3bb
-
Filesize
1.1MB
MD539e6c17236245efd682938eae6e893bc
SHA144eb2d96024e53cfbe00d4937c5a9e2f7b5316b0
SHA2565a02dfdf05dc3e08237d7e4f630c39c76efa8e08e9812cd4c47d58f5c1d736f1
SHA512c814ed4a550b9d94386b17db38e51d3d7d000757c7dd44629d99626ee1e2160c930fdfc140947e8991db838b8a21125746e25098ab161419558d91c06de59d3e
-
Filesize
1.1MB
MD523847388136d93e408f8e9280871a8df
SHA1ab1308342aa17beaeccce2db1c51124261589f68
SHA256ed79a8707e223ab1e912b81a025d01aefcf06478eb96ca2084aded9b89407cd6
SHA512a42b2854ea959a1d59ebf29697c5c57e723bab27d6c9dde8d5d12de17836d3776572dd7a95554a126e8cd4793527b4fd8befafa1bf8467bb1deb04fd5501aec0