Analysis
-
max time kernel
91s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
30-05-2024 20:36
Static task
static1
Behavioral task
behavioral1
Sample
ec4eaa35ae6752aa92a75e24535e4c664f81fc4b30c27e514a15de22c8fb3b1a.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
ec4eaa35ae6752aa92a75e24535e4c664f81fc4b30c27e514a15de22c8fb3b1a.exe
Resource
win10v2004-20240426-en
General
-
Target
ec4eaa35ae6752aa92a75e24535e4c664f81fc4b30c27e514a15de22c8fb3b1a.exe
-
Size
1.1MB
-
MD5
5dba4c436b7e0583f72cbd00e30b23dc
-
SHA1
b426da46c0d7cc66b420f7bbc97071cee7d879e8
-
SHA256
ec4eaa35ae6752aa92a75e24535e4c664f81fc4b30c27e514a15de22c8fb3b1a
-
SHA512
a8b512879b8d56196ca5a88956802d8e29b82a7123167bf244b377a3f169e3613b0e4ad55155ef9322e7100b42de929e86405a3cc56233c3b90b0f936c1e460d
-
SSDEEP
24576:aH0dl8myX9Bg42QoXFkrzkmplSgRDYo0lG4Z8r7Qfbkiu5Qu:acallSllG4ZM7QzMF
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation svchcst.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation ec4eaa35ae6752aa92a75e24535e4c664f81fc4b30c27e514a15de22c8fb3b1a.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation WScript.exe -
Deletes itself 1 IoCs
pid Process 1920 svchcst.exe -
Executes dropped EXE 3 IoCs
pid Process 1920 svchcst.exe 4216 svchcst.exe 864 svchcst.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\Local Settings svchcst.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\Local Settings ec4eaa35ae6752aa92a75e24535e4c664f81fc4b30c27e514a15de22c8fb3b1a.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1792 ec4eaa35ae6752aa92a75e24535e4c664f81fc4b30c27e514a15de22c8fb3b1a.exe 1792 ec4eaa35ae6752aa92a75e24535e4c664f81fc4b30c27e514a15de22c8fb3b1a.exe 1920 svchcst.exe 1920 svchcst.exe 1920 svchcst.exe 1920 svchcst.exe 1920 svchcst.exe 1920 svchcst.exe 1920 svchcst.exe 1920 svchcst.exe 1920 svchcst.exe 1920 svchcst.exe 1920 svchcst.exe 1920 svchcst.exe 1920 svchcst.exe 1920 svchcst.exe 1920 svchcst.exe 1920 svchcst.exe 1920 svchcst.exe 1920 svchcst.exe 1920 svchcst.exe 1920 svchcst.exe 1920 svchcst.exe 1920 svchcst.exe 1920 svchcst.exe 1920 svchcst.exe 1920 svchcst.exe 1920 svchcst.exe 1920 svchcst.exe 1920 svchcst.exe 1920 svchcst.exe 1920 svchcst.exe 1920 svchcst.exe 1920 svchcst.exe 1920 svchcst.exe 1920 svchcst.exe 1920 svchcst.exe 1920 svchcst.exe 1920 svchcst.exe 1920 svchcst.exe 1920 svchcst.exe 1920 svchcst.exe 1920 svchcst.exe 1920 svchcst.exe 1920 svchcst.exe 1920 svchcst.exe 1920 svchcst.exe 1920 svchcst.exe 1920 svchcst.exe 1920 svchcst.exe 1920 svchcst.exe 1920 svchcst.exe 1920 svchcst.exe 1920 svchcst.exe 1920 svchcst.exe 1920 svchcst.exe 1920 svchcst.exe 1920 svchcst.exe 1920 svchcst.exe 1920 svchcst.exe 1920 svchcst.exe 1920 svchcst.exe 1920 svchcst.exe 1920 svchcst.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1792 ec4eaa35ae6752aa92a75e24535e4c664f81fc4b30c27e514a15de22c8fb3b1a.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1792 ec4eaa35ae6752aa92a75e24535e4c664f81fc4b30c27e514a15de22c8fb3b1a.exe 1792 ec4eaa35ae6752aa92a75e24535e4c664f81fc4b30c27e514a15de22c8fb3b1a.exe 1920 svchcst.exe 1920 svchcst.exe 4216 svchcst.exe 4216 svchcst.exe 864 svchcst.exe 864 svchcst.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1792 wrote to memory of 616 1792 ec4eaa35ae6752aa92a75e24535e4c664f81fc4b30c27e514a15de22c8fb3b1a.exe 85 PID 1792 wrote to memory of 616 1792 ec4eaa35ae6752aa92a75e24535e4c664f81fc4b30c27e514a15de22c8fb3b1a.exe 85 PID 1792 wrote to memory of 616 1792 ec4eaa35ae6752aa92a75e24535e4c664f81fc4b30c27e514a15de22c8fb3b1a.exe 85 PID 616 wrote to memory of 1920 616 WScript.exe 93 PID 616 wrote to memory of 1920 616 WScript.exe 93 PID 616 wrote to memory of 1920 616 WScript.exe 93 PID 1920 wrote to memory of 4812 1920 svchcst.exe 94 PID 1920 wrote to memory of 4812 1920 svchcst.exe 94 PID 1920 wrote to memory of 4812 1920 svchcst.exe 94 PID 1920 wrote to memory of 4040 1920 svchcst.exe 95 PID 1920 wrote to memory of 4040 1920 svchcst.exe 95 PID 1920 wrote to memory of 4040 1920 svchcst.exe 95 PID 4812 wrote to memory of 4216 4812 WScript.exe 98 PID 4812 wrote to memory of 4216 4812 WScript.exe 98 PID 4812 wrote to memory of 4216 4812 WScript.exe 98 PID 4040 wrote to memory of 864 4040 WScript.exe 99 PID 4040 wrote to memory of 864 4040 WScript.exe 99 PID 4040 wrote to memory of 864 4040 WScript.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec4eaa35ae6752aa92a75e24535e4c664f81fc4b30c27e514a15de22c8fb3b1a.exe"C:\Users\Admin\AppData\Local\Temp\ec4eaa35ae6752aa92a75e24535e4c664f81fc4b30c27e514a15de22c8fb3b1a.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:616 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"4⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4216
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"4⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:864
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92B
MD567b9b3e2ded7086f393ebbc36c5e7bca
SHA1e6299d0450b9a92a18cc23b5704a2b475652c790
SHA25644063c266686263f14cd2a83fee124fb3e61a9171a6aab69709464f49511011d
SHA512826fbc9481f46b1ae3db828a665c55c349023caf563e6e8c17321f5f3af3e4c3914955db6f0eebfc6defe561315435d47310b4d0499ab9c2c85bb61264dedc09
-
Filesize
753B
MD567a6eafa5f0abe404b977c17756438b1
SHA1fea5d91c4b32a78d527097a071ca01f5ea575baf
SHA256c715a3e2a812c7139581a4662d02b9e277a5fc344b617f566493de7266e30f60
SHA512cbeed76b6f88f7422d1312cb1b7f24df84af463230ed51eb7501388ff75d720b97547eb810790f3485f988f3326c234cc2694fea3a303fa977d9ef9c15aca9fa
-
Filesize
696B
MD50e6005a9dcb5a78d6fdd54527602f926
SHA190adc62e99f3c94c643596af0e17b5853b91fe1f
SHA256847552b1ad30bd72f24acfe4afa5c326d3e79d7c2f147c958d72e92daca716da
SHA512b4acfd81c1e926fcd305690aa3780bbec50460bcf947d17c20d6445faca4e774294b9da3a144207ccb3855e3ea2008a2d82ef691f32a4db6c7c3eb8202c6b568
-
Filesize
1.1MB
MD51f3128fef5a3b706449e2ff76e87fc83
SHA12653ed6b8f23e84e92c27f06b7aa5c413cfd6919
SHA256482d199262ec7058a38fe26f3a54e8ee7fd61e68724bd0a764523a6520ff9d85
SHA512d3a0448fed8a3859043c49e4e189492eb98571132765ce8e8d90c12a6160acf1975d65d9c89108312b8a91bffdc42537dba3d61057e0cc8d3545a2c66b9b2d0b
-
Filesize
1.1MB
MD5259a4e930fd6d50e4a1fe828f3397ca9
SHA15f8bc90a162aad4d68693d4662fbc9bb6272e6a8
SHA256a81d292f84df82fae0be179d388765e5e1a489bba27080e4e8f043cd93846344
SHA5122515a91633f78002444080bdccc93b97c70279dcb4b9f61cc821112909d2b247f8a22aefe8233e552b881fbee33d1c29e3773d48621ad99705f2da8f1fc6d127