Analysis
-
max time kernel
135s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04/06/2024, 22:32
Static task
static1
Behavioral task
behavioral1
Sample
80b00338efca5c83e07d1cbde83ed8048c54633297a48993fc62589e4b2c5047.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
80b00338efca5c83e07d1cbde83ed8048c54633297a48993fc62589e4b2c5047.exe
Resource
win10v2004-20240508-en
General
-
Target
80b00338efca5c83e07d1cbde83ed8048c54633297a48993fc62589e4b2c5047.exe
-
Size
1.1MB
-
MD5
31d4b19cf3eba1ed211ebce501553410
-
SHA1
3b5c92cc9ab729638aaf0acf561c8edbabd4377d
-
SHA256
80b00338efca5c83e07d1cbde83ed8048c54633297a48993fc62589e4b2c5047
-
SHA512
0236e9df14bfebe86561106fb730f919f9e5fe0e8df2d77d06810a296306c70ecfc8ba16f267fa8c919eb9ba2060df0b99bf721ee4ac8ddb0e8cad30881bad11
-
SSDEEP
24576:aH0dl8myX9Bg42QoXFkrzkmplSgRDYo0lG4Z8r7Qfbkiu5Qh:acallSllG4ZM7QzMS
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 80b00338efca5c83e07d1cbde83ed8048c54633297a48993fc62589e4b2c5047.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation svchcst.exe -
Deletes itself 1 IoCs
pid Process 4868 svchcst.exe -
Executes dropped EXE 3 IoCs
pid Process 4868 svchcst.exe 3284 svchcst.exe 2572 svchcst.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings 80b00338efca5c83e07d1cbde83ed8048c54633297a48993fc62589e4b2c5047.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings svchcst.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5024 80b00338efca5c83e07d1cbde83ed8048c54633297a48993fc62589e4b2c5047.exe 5024 80b00338efca5c83e07d1cbde83ed8048c54633297a48993fc62589e4b2c5047.exe 4868 svchcst.exe 4868 svchcst.exe 4868 svchcst.exe 4868 svchcst.exe 4868 svchcst.exe 4868 svchcst.exe 4868 svchcst.exe 4868 svchcst.exe 4868 svchcst.exe 4868 svchcst.exe 4868 svchcst.exe 4868 svchcst.exe 4868 svchcst.exe 4868 svchcst.exe 4868 svchcst.exe 4868 svchcst.exe 4868 svchcst.exe 4868 svchcst.exe 4868 svchcst.exe 4868 svchcst.exe 4868 svchcst.exe 4868 svchcst.exe 4868 svchcst.exe 4868 svchcst.exe 4868 svchcst.exe 4868 svchcst.exe 4868 svchcst.exe 4868 svchcst.exe 4868 svchcst.exe 4868 svchcst.exe 4868 svchcst.exe 4868 svchcst.exe 4868 svchcst.exe 4868 svchcst.exe 4868 svchcst.exe 4868 svchcst.exe 4868 svchcst.exe 4868 svchcst.exe 4868 svchcst.exe 4868 svchcst.exe 4868 svchcst.exe 4868 svchcst.exe 4868 svchcst.exe 4868 svchcst.exe 4868 svchcst.exe 4868 svchcst.exe 4868 svchcst.exe 4868 svchcst.exe 4868 svchcst.exe 4868 svchcst.exe 4868 svchcst.exe 4868 svchcst.exe 4868 svchcst.exe 4868 svchcst.exe 4868 svchcst.exe 4868 svchcst.exe 4868 svchcst.exe 4868 svchcst.exe 4868 svchcst.exe 4868 svchcst.exe 4868 svchcst.exe 4868 svchcst.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 5024 80b00338efca5c83e07d1cbde83ed8048c54633297a48993fc62589e4b2c5047.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 5024 80b00338efca5c83e07d1cbde83ed8048c54633297a48993fc62589e4b2c5047.exe 5024 80b00338efca5c83e07d1cbde83ed8048c54633297a48993fc62589e4b2c5047.exe 4868 svchcst.exe 4868 svchcst.exe 3284 svchcst.exe 3284 svchcst.exe 2572 svchcst.exe 2572 svchcst.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 5024 wrote to memory of 1724 5024 80b00338efca5c83e07d1cbde83ed8048c54633297a48993fc62589e4b2c5047.exe 90 PID 5024 wrote to memory of 1724 5024 80b00338efca5c83e07d1cbde83ed8048c54633297a48993fc62589e4b2c5047.exe 90 PID 5024 wrote to memory of 1724 5024 80b00338efca5c83e07d1cbde83ed8048c54633297a48993fc62589e4b2c5047.exe 90 PID 1724 wrote to memory of 4868 1724 WScript.exe 103 PID 1724 wrote to memory of 4868 1724 WScript.exe 103 PID 1724 wrote to memory of 4868 1724 WScript.exe 103 PID 4868 wrote to memory of 2616 4868 svchcst.exe 104 PID 4868 wrote to memory of 2616 4868 svchcst.exe 104 PID 4868 wrote to memory of 2616 4868 svchcst.exe 104 PID 4868 wrote to memory of 1040 4868 svchcst.exe 105 PID 4868 wrote to memory of 1040 4868 svchcst.exe 105 PID 4868 wrote to memory of 1040 4868 svchcst.exe 105 PID 1040 wrote to memory of 3284 1040 WScript.exe 108 PID 1040 wrote to memory of 3284 1040 WScript.exe 108 PID 1040 wrote to memory of 3284 1040 WScript.exe 108 PID 2616 wrote to memory of 2572 2616 WScript.exe 109 PID 2616 wrote to memory of 2572 2616 WScript.exe 109 PID 2616 wrote to memory of 2572 2616 WScript.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\80b00338efca5c83e07d1cbde83ed8048c54633297a48993fc62589e4b2c5047.exe"C:\Users\Admin\AppData\Local\Temp\80b00338efca5c83e07d1cbde83ed8048c54633297a48993fc62589e4b2c5047.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"4⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2572
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"4⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3284
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4232,i,13879737908471496610,15335851594401413307,262144 --variations-seed-version --mojo-platform-channel-handle=3756 /prefetch:81⤵PID:3036
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92B
MD567b9b3e2ded7086f393ebbc36c5e7bca
SHA1e6299d0450b9a92a18cc23b5704a2b475652c790
SHA25644063c266686263f14cd2a83fee124fb3e61a9171a6aab69709464f49511011d
SHA512826fbc9481f46b1ae3db828a665c55c349023caf563e6e8c17321f5f3af3e4c3914955db6f0eebfc6defe561315435d47310b4d0499ab9c2c85bb61264dedc09
-
Filesize
753B
MD53cb355fd2541ac7f097dca4cdca7d493
SHA13cd4117b4478ff6f82fb61776908d6e842d40c3f
SHA256b0d25b12f89b23ae7c4fcedc3aa5ce96020e0cf222cd366a123c3a297a1e6b1e
SHA5120965993052d52d057cc56ef7650c13bcbf82df3d26b03add378f4f420b31eb9dd2086e68f76611a86f41823db9bb208320e249e65312d6ec8d12a48904510351
-
Filesize
696B
MD5e941c404604f780e37c7e63233301fa0
SHA1d27c9a3b90881add1a06b41b5931267fc818ff08
SHA2566add2531fc05662418f48a46f522fa4507053ece8d0d94a04c0c213d27da81ce
SHA5121f448e52f5aa81f30ecf10d6222fa0913ab7a5f3c0f2c7e6a9deb231e9bf55937c4fb0f84bbaeccdd9040e163ae371daec55eff48d633cd6d6bd409433fbf4f2
-
Filesize
1.1MB
MD52a37665e4e40e908e39625c369068adb
SHA1981509c7a6531626da921c57eefc0cb50715a8f6
SHA256f8ca553aa03d940d86003f9b1aaf47ead15d22adf7ca15b5e6c5ce2bd5431407
SHA512763ff07313145de3a71e51138c5edaf32e702c52b9e62522bcae68567e239a4e25f0b3f5b9a9d4e7c596c84a3a84149c92c47b960fc068cb5326eb51c1366a2f
-
Filesize
1.1MB
MD54b9ebf326a38c1bd9b1dbed604ea8233
SHA16f71e3abb09416056f36b7d2e075d3e0ccc12d96
SHA256a47c7138435af43c00e8781b413725a7ec533ef41a4842da467a0b984217ea80
SHA512f6f7b833f3d8694c8cc6b60048b1690b11a63ceb297435e3856b736597bfade59fd9d850e0eae57a587bec4da49d97015000315c131d4cdbf572483939ce4dd6