Analysis
-
max time kernel
79s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15-06-2024 21:18
Static task
static1
Behavioral task
behavioral1
Sample
7f9c2e3d6afbb444ec59f46a211e845ae2f2408e36b7eb22b67bd03126683ccf.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
7f9c2e3d6afbb444ec59f46a211e845ae2f2408e36b7eb22b67bd03126683ccf.exe
Resource
win10v2004-20240508-en
General
-
Target
7f9c2e3d6afbb444ec59f46a211e845ae2f2408e36b7eb22b67bd03126683ccf.exe
-
Size
1.1MB
-
MD5
b9b066dfccbed40eec3c847b21ec3608
-
SHA1
b9aa6c81e0188f375c6fe69c88730ef44af8e065
-
SHA256
7f9c2e3d6afbb444ec59f46a211e845ae2f2408e36b7eb22b67bd03126683ccf
-
SHA512
10da824cc5e1089b99af9c1f7a07e83d1bff92bac9169f6116fbcb19da618141fe6d72e161fbd58989652953189d413fd559a73ce6bee4a683a0677870845723
-
SSDEEP
24576:CH0dl8myX9Bg42QoXFkrzkmmlSgRDko0lG4Z8r7Qfbkiu5Qj:CcaClSFlG4ZM7QzMk
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 7 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation svchcst.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation 7f9c2e3d6afbb444ec59f46a211e845ae2f2408e36b7eb22b67bd03126683ccf.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation svchcst.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation WScript.exe -
Deletes itself 1 IoCs
pid Process 1288 svchcst.exe -
Executes dropped EXE 4 IoCs
pid Process 1288 svchcst.exe 3908 svchcst.exe 844 svchcst.exe 4124 svchcst.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 7 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000_Classes\Local Settings svchcst.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000_Classes\Local Settings svchcst.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000_Classes\Local Settings 7f9c2e3d6afbb444ec59f46a211e845ae2f2408e36b7eb22b67bd03126683ccf.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4864 7f9c2e3d6afbb444ec59f46a211e845ae2f2408e36b7eb22b67bd03126683ccf.exe 4864 7f9c2e3d6afbb444ec59f46a211e845ae2f2408e36b7eb22b67bd03126683ccf.exe 1288 svchcst.exe 1288 svchcst.exe 1288 svchcst.exe 1288 svchcst.exe 1288 svchcst.exe 1288 svchcst.exe 1288 svchcst.exe 1288 svchcst.exe 1288 svchcst.exe 1288 svchcst.exe 1288 svchcst.exe 1288 svchcst.exe 1288 svchcst.exe 1288 svchcst.exe 1288 svchcst.exe 1288 svchcst.exe 1288 svchcst.exe 1288 svchcst.exe 1288 svchcst.exe 1288 svchcst.exe 1288 svchcst.exe 1288 svchcst.exe 1288 svchcst.exe 1288 svchcst.exe 1288 svchcst.exe 1288 svchcst.exe 1288 svchcst.exe 1288 svchcst.exe 1288 svchcst.exe 1288 svchcst.exe 1288 svchcst.exe 1288 svchcst.exe 1288 svchcst.exe 1288 svchcst.exe 1288 svchcst.exe 1288 svchcst.exe 1288 svchcst.exe 1288 svchcst.exe 1288 svchcst.exe 1288 svchcst.exe 1288 svchcst.exe 1288 svchcst.exe 1288 svchcst.exe 1288 svchcst.exe 1288 svchcst.exe 1288 svchcst.exe 1288 svchcst.exe 1288 svchcst.exe 1288 svchcst.exe 1288 svchcst.exe 1288 svchcst.exe 1288 svchcst.exe 1288 svchcst.exe 1288 svchcst.exe 1288 svchcst.exe 1288 svchcst.exe 1288 svchcst.exe 1288 svchcst.exe 1288 svchcst.exe 1288 svchcst.exe 1288 svchcst.exe 1288 svchcst.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4864 7f9c2e3d6afbb444ec59f46a211e845ae2f2408e36b7eb22b67bd03126683ccf.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 4864 7f9c2e3d6afbb444ec59f46a211e845ae2f2408e36b7eb22b67bd03126683ccf.exe 4864 7f9c2e3d6afbb444ec59f46a211e845ae2f2408e36b7eb22b67bd03126683ccf.exe 1288 svchcst.exe 1288 svchcst.exe 3908 svchcst.exe 3908 svchcst.exe 4124 svchcst.exe 4124 svchcst.exe 844 svchcst.exe 844 svchcst.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 4864 wrote to memory of 1076 4864 7f9c2e3d6afbb444ec59f46a211e845ae2f2408e36b7eb22b67bd03126683ccf.exe 80 PID 4864 wrote to memory of 1076 4864 7f9c2e3d6afbb444ec59f46a211e845ae2f2408e36b7eb22b67bd03126683ccf.exe 80 PID 4864 wrote to memory of 1076 4864 7f9c2e3d6afbb444ec59f46a211e845ae2f2408e36b7eb22b67bd03126683ccf.exe 80 PID 1076 wrote to memory of 1288 1076 WScript.exe 82 PID 1076 wrote to memory of 1288 1076 WScript.exe 82 PID 1076 wrote to memory of 1288 1076 WScript.exe 82 PID 1288 wrote to memory of 3352 1288 svchcst.exe 83 PID 1288 wrote to memory of 3352 1288 svchcst.exe 83 PID 1288 wrote to memory of 3352 1288 svchcst.exe 83 PID 1288 wrote to memory of 2912 1288 svchcst.exe 84 PID 1288 wrote to memory of 2912 1288 svchcst.exe 84 PID 1288 wrote to memory of 2912 1288 svchcst.exe 84 PID 3352 wrote to memory of 3908 3352 WScript.exe 85 PID 3352 wrote to memory of 3908 3352 WScript.exe 85 PID 3352 wrote to memory of 3908 3352 WScript.exe 85 PID 3908 wrote to memory of 2868 3908 svchcst.exe 86 PID 3908 wrote to memory of 2868 3908 svchcst.exe 86 PID 3908 wrote to memory of 2868 3908 svchcst.exe 86 PID 3908 wrote to memory of 4852 3908 svchcst.exe 87 PID 3908 wrote to memory of 4852 3908 svchcst.exe 87 PID 3908 wrote to memory of 4852 3908 svchcst.exe 87 PID 2868 wrote to memory of 4124 2868 WScript.exe 88 PID 2868 wrote to memory of 4124 2868 WScript.exe 88 PID 2868 wrote to memory of 4124 2868 WScript.exe 88 PID 4852 wrote to memory of 844 4852 WScript.exe 89 PID 4852 wrote to memory of 844 4852 WScript.exe 89 PID 4852 wrote to memory of 844 4852 WScript.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\7f9c2e3d6afbb444ec59f46a211e845ae2f2408e36b7eb22b67bd03126683ccf.exe"C:\Users\Admin\AppData\Local\Temp\7f9c2e3d6afbb444ec59f46a211e845ae2f2408e36b7eb22b67bd03126683ccf.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"4⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"6⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4124
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"6⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:844
-
-
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"4⤵PID:2912
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92B
MD567b9b3e2ded7086f393ebbc36c5e7bca
SHA1e6299d0450b9a92a18cc23b5704a2b475652c790
SHA25644063c266686263f14cd2a83fee124fb3e61a9171a6aab69709464f49511011d
SHA512826fbc9481f46b1ae3db828a665c55c349023caf563e6e8c17321f5f3af3e4c3914955db6f0eebfc6defe561315435d47310b4d0499ab9c2c85bb61264dedc09
-
Filesize
753B
MD5bf7d4f335674c2c5374fb21a77bc67d7
SHA1946534dce8af678f3b730413ad5223afb5c21a16
SHA2561be8ac2ae1ce4e9c0bc34a78ae48ff462ea1defdd94ae92d19b4505861d86c89
SHA512ef99fb88885d784b2a2310e11d38c4036e530ac932b30b165f0e6e45e7f04eccdeb9ef7838cb7868386906f28a85de84da31210617466b3c2401eea6f0921cc4
-
Filesize
696B
MD5f76c7cf504b872903a1325a57e8baaf9
SHA1896ac9d8338b41c7673781f07915612c538c385f
SHA25646436b128cbdb907e9666c1aa6257164f7e5a2ebe1c79b9198b36e50115a8163
SHA51259c0e9f508682af572185dd2578ad1e62abb99297a99018af7638bc8d2f6693fe00900bd739e00a912088f77624f08034dba041ce1677e2924cb8ab3196b6054
-
Filesize
696B
MD5ad7007ed9542468662553e405df66821
SHA1757c5ee287a113d689f2d370176fcf9c9e1223a3
SHA25612967e637928b853b708430671e1b72f6ca847a2af2680f8f15da98efb31161e
SHA512812220b05239ebb0e14f3cd738e58274deb60624eacc360d2b3be6c5010dc418f2587f5f6736a1d80a3a5f52ae9887a492e8934e64af66c89b45a9b47d3069c9
-
Filesize
1.1MB
MD5f2c141135928539ad1d5395b39eef068
SHA188b045e7a08acab5c5b81b13c38f5591641eab43
SHA25648ce3d4118db62504d9ce1fe1b41f9d1de03015d4bcd960d70ad7a25ac2ce5a4
SHA5121dab01a7444d3d479d296604efce99158438a55d02c61af767ad2c700f37417a22cdbec8c06dbdd62ff0b781f3876fa12bf0de8d73356aec5b7442d3cd08ebd0
-
Filesize
1.1MB
MD5af3e40f73dd90af5dc1d52e5549d135c
SHA1a2aba32812adf8c26c556580c9cb662ad98129f6
SHA256a32f12d7d6501816b9f5757d0ce0773363935a19439da700491cad997aefadf4
SHA5129f6dbed8074fab3d67f2a7b7f40aa8bd721ae2f829f06cca928e4e0b269c174dd30673aff76c0f43c0e6ab076ccb1e42950e617f4b55ed4311f0ce023043ec09
-
Filesize
1.1MB
MD56ff553b23a413b9cf843d5a31e8a9a9d
SHA1dcb84a2d6e70a450774f338e2be4ad5ce35ea6e6
SHA2562bf3ba9f3c6f5288fff18074865a09d896d0b7a3cd475b51008086fd1f21e1fc
SHA512b2a8e54c57f8abac262115686b79e3070d87e82c8bacafb851e7ba785b30cacee36c19113118068f0ddfb6a72f5fd0d9d99ac353569d9bb9a80e3a2607c1b57d