Analysis

  • max time kernel
    91s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-05-2024 20:36

General

  • Target

    ec4eaa35ae6752aa92a75e24535e4c664f81fc4b30c27e514a15de22c8fb3b1a.exe

  • Size

    1.1MB

  • MD5

    5dba4c436b7e0583f72cbd00e30b23dc

  • SHA1

    b426da46c0d7cc66b420f7bbc97071cee7d879e8

  • SHA256

    ec4eaa35ae6752aa92a75e24535e4c664f81fc4b30c27e514a15de22c8fb3b1a

  • SHA512

    a8b512879b8d56196ca5a88956802d8e29b82a7123167bf244b377a3f169e3613b0e4ad55155ef9322e7100b42de929e86405a3cc56233c3b90b0f936c1e460d

  • SSDEEP

    24576:aH0dl8myX9Bg42QoXFkrzkmplSgRDYo0lG4Z8r7Qfbkiu5Qu:acallSllG4ZM7QzMF

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 5 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ec4eaa35ae6752aa92a75e24535e4c664f81fc4b30c27e514a15de22c8fb3b1a.exe
    "C:\Users\Admin\AppData\Local\Temp\ec4eaa35ae6752aa92a75e24535e4c664f81fc4b30c27e514a15de22c8fb3b1a.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1792
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
      2⤵
      • Checks computer location settings
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:616
      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
        3⤵
        • Checks computer location settings
        • Deletes itself
        • Executes dropped EXE
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1920
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
          4⤵
          • Checks computer location settings
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:4812
          • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:4216
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
          4⤵
          • Checks computer location settings
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:4040
          • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:864

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Config.ini

    Filesize

    92B

    MD5

    67b9b3e2ded7086f393ebbc36c5e7bca

    SHA1

    e6299d0450b9a92a18cc23b5704a2b475652c790

    SHA256

    44063c266686263f14cd2a83fee124fb3e61a9171a6aab69709464f49511011d

    SHA512

    826fbc9481f46b1ae3db828a665c55c349023caf563e6e8c17321f5f3af3e4c3914955db6f0eebfc6defe561315435d47310b4d0499ab9c2c85bb61264dedc09

  • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

    Filesize

    753B

    MD5

    67a6eafa5f0abe404b977c17756438b1

    SHA1

    fea5d91c4b32a78d527097a071ca01f5ea575baf

    SHA256

    c715a3e2a812c7139581a4662d02b9e277a5fc344b617f566493de7266e30f60

    SHA512

    cbeed76b6f88f7422d1312cb1b7f24df84af463230ed51eb7501388ff75d720b97547eb810790f3485f988f3326c234cc2694fea3a303fa977d9ef9c15aca9fa

  • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

    Filesize

    696B

    MD5

    0e6005a9dcb5a78d6fdd54527602f926

    SHA1

    90adc62e99f3c94c643596af0e17b5853b91fe1f

    SHA256

    847552b1ad30bd72f24acfe4afa5c326d3e79d7c2f147c958d72e92daca716da

    SHA512

    b4acfd81c1e926fcd305690aa3780bbec50460bcf947d17c20d6445faca4e774294b9da3a144207ccb3855e3ea2008a2d82ef691f32a4db6c7c3eb8202c6b568

  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    1.1MB

    MD5

    1f3128fef5a3b706449e2ff76e87fc83

    SHA1

    2653ed6b8f23e84e92c27f06b7aa5c413cfd6919

    SHA256

    482d199262ec7058a38fe26f3a54e8ee7fd61e68724bd0a764523a6520ff9d85

    SHA512

    d3a0448fed8a3859043c49e4e189492eb98571132765ce8e8d90c12a6160acf1975d65d9c89108312b8a91bffdc42537dba3d61057e0cc8d3545a2c66b9b2d0b

  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    1.1MB

    MD5

    259a4e930fd6d50e4a1fe828f3397ca9

    SHA1

    5f8bc90a162aad4d68693d4662fbc9bb6272e6a8

    SHA256

    a81d292f84df82fae0be179d388765e5e1a489bba27080e4e8f043cd93846344

    SHA512

    2515a91633f78002444080bdccc93b97c70279dcb4b9f61cc821112909d2b247f8a22aefe8233e552b881fbee33d1c29e3773d48621ad99705f2da8f1fc6d127

  • memory/864-26-0x0000000000400000-0x000000000055F000-memory.dmp

    Filesize

    1.4MB

  • memory/864-28-0x0000000000400000-0x000000000055F000-memory.dmp

    Filesize

    1.4MB

  • memory/1792-0-0x0000000000400000-0x000000000055F000-memory.dmp

    Filesize

    1.4MB

  • memory/1792-9-0x0000000000400000-0x000000000055F000-memory.dmp

    Filesize

    1.4MB

  • memory/1920-22-0x0000000000400000-0x000000000055F000-memory.dmp

    Filesize

    1.4MB

  • memory/4216-27-0x0000000000400000-0x000000000055F000-memory.dmp

    Filesize

    1.4MB