Analysis
-
max time kernel
93s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28/06/2024, 21:22
Static task
static1
Behavioral task
behavioral1
Sample
b436a280cc349cd2e8c0e7a9f9ef1c9972e98cece35762ad2967396578d9dbae.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
b436a280cc349cd2e8c0e7a9f9ef1c9972e98cece35762ad2967396578d9dbae.exe
Resource
win10v2004-20240508-en
General
-
Target
b436a280cc349cd2e8c0e7a9f9ef1c9972e98cece35762ad2967396578d9dbae.exe
-
Size
1.1MB
-
MD5
c4dd9e340824e1cb2b64bb1b54a57c77
-
SHA1
2a9529ba8dba19db43f1455f63c513c6f55fedce
-
SHA256
b436a280cc349cd2e8c0e7a9f9ef1c9972e98cece35762ad2967396578d9dbae
-
SHA512
3c6129191d10b3bdfc2ef206cd2f2010342554a5ef263a61b151923a0f45c463b73d5c77a6a82c76c511cd7bb5c50b6eb10bd2a4714394b67d1df5f4c03abe26
-
SSDEEP
24576:aH0dl8myX9Bg42QoXFkrzkmplSgRDYo0lG4Z8r7Qfbkiu5Qn:acallSllG4ZM7QzMw
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 12 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation svchcst.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation svchcst.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation b436a280cc349cd2e8c0e7a9f9ef1c9972e98cece35762ad2967396578d9dbae.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation svchcst.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation svchcst.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation WScript.exe -
Deletes itself 1 IoCs
pid Process 1916 svchcst.exe -
Executes dropped EXE 7 IoCs
pid Process 1916 svchcst.exe 4024 svchcst.exe 452 svchcst.exe 3512 svchcst.exe 4396 svchcst.exe 4572 svchcst.exe 4504 svchcst.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 12 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings b436a280cc349cd2e8c0e7a9f9ef1c9972e98cece35762ad2967396578d9dbae.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings svchcst.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings svchcst.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings svchcst.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings svchcst.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1088 b436a280cc349cd2e8c0e7a9f9ef1c9972e98cece35762ad2967396578d9dbae.exe 1088 b436a280cc349cd2e8c0e7a9f9ef1c9972e98cece35762ad2967396578d9dbae.exe 1088 b436a280cc349cd2e8c0e7a9f9ef1c9972e98cece35762ad2967396578d9dbae.exe 1088 b436a280cc349cd2e8c0e7a9f9ef1c9972e98cece35762ad2967396578d9dbae.exe 1916 svchcst.exe 1916 svchcst.exe 1916 svchcst.exe 1916 svchcst.exe 1916 svchcst.exe 1916 svchcst.exe 1916 svchcst.exe 1916 svchcst.exe 1916 svchcst.exe 1916 svchcst.exe 1916 svchcst.exe 1916 svchcst.exe 1916 svchcst.exe 1916 svchcst.exe 1916 svchcst.exe 1916 svchcst.exe 1916 svchcst.exe 1916 svchcst.exe 1916 svchcst.exe 1916 svchcst.exe 1916 svchcst.exe 1916 svchcst.exe 1916 svchcst.exe 1916 svchcst.exe 1916 svchcst.exe 1916 svchcst.exe 1916 svchcst.exe 1916 svchcst.exe 1916 svchcst.exe 1916 svchcst.exe 1916 svchcst.exe 1916 svchcst.exe 1916 svchcst.exe 1916 svchcst.exe 1916 svchcst.exe 1916 svchcst.exe 1916 svchcst.exe 1916 svchcst.exe 1916 svchcst.exe 1916 svchcst.exe 1916 svchcst.exe 1916 svchcst.exe 1916 svchcst.exe 1916 svchcst.exe 1916 svchcst.exe 1916 svchcst.exe 1916 svchcst.exe 1916 svchcst.exe 1916 svchcst.exe 1916 svchcst.exe 1916 svchcst.exe 1916 svchcst.exe 1916 svchcst.exe 1916 svchcst.exe 1916 svchcst.exe 1916 svchcst.exe 1916 svchcst.exe 1916 svchcst.exe 1916 svchcst.exe 1916 svchcst.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1088 b436a280cc349cd2e8c0e7a9f9ef1c9972e98cece35762ad2967396578d9dbae.exe -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 1088 b436a280cc349cd2e8c0e7a9f9ef1c9972e98cece35762ad2967396578d9dbae.exe 1088 b436a280cc349cd2e8c0e7a9f9ef1c9972e98cece35762ad2967396578d9dbae.exe 1916 svchcst.exe 1916 svchcst.exe 4024 svchcst.exe 4024 svchcst.exe 452 svchcst.exe 452 svchcst.exe 3512 svchcst.exe 3512 svchcst.exe 4396 svchcst.exe 4396 svchcst.exe 4572 svchcst.exe 4572 svchcst.exe 4504 svchcst.exe 4504 svchcst.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 1088 wrote to memory of 3460 1088 b436a280cc349cd2e8c0e7a9f9ef1c9972e98cece35762ad2967396578d9dbae.exe 81 PID 1088 wrote to memory of 3460 1088 b436a280cc349cd2e8c0e7a9f9ef1c9972e98cece35762ad2967396578d9dbae.exe 81 PID 1088 wrote to memory of 3460 1088 b436a280cc349cd2e8c0e7a9f9ef1c9972e98cece35762ad2967396578d9dbae.exe 81 PID 3460 wrote to memory of 1916 3460 WScript.exe 87 PID 3460 wrote to memory of 1916 3460 WScript.exe 87 PID 3460 wrote to memory of 1916 3460 WScript.exe 87 PID 1916 wrote to memory of 4228 1916 svchcst.exe 88 PID 1916 wrote to memory of 4228 1916 svchcst.exe 88 PID 1916 wrote to memory of 4228 1916 svchcst.exe 88 PID 1916 wrote to memory of 3180 1916 svchcst.exe 89 PID 1916 wrote to memory of 3180 1916 svchcst.exe 89 PID 1916 wrote to memory of 3180 1916 svchcst.exe 89 PID 4228 wrote to memory of 4024 4228 WScript.exe 92 PID 4228 wrote to memory of 4024 4228 WScript.exe 92 PID 4228 wrote to memory of 4024 4228 WScript.exe 92 PID 3180 wrote to memory of 452 3180 WScript.exe 93 PID 3180 wrote to memory of 452 3180 WScript.exe 93 PID 3180 wrote to memory of 452 3180 WScript.exe 93 PID 4024 wrote to memory of 3112 4024 svchcst.exe 94 PID 4024 wrote to memory of 3112 4024 svchcst.exe 94 PID 4024 wrote to memory of 3112 4024 svchcst.exe 94 PID 4024 wrote to memory of 2368 4024 svchcst.exe 95 PID 4024 wrote to memory of 2368 4024 svchcst.exe 95 PID 4024 wrote to memory of 2368 4024 svchcst.exe 95 PID 2368 wrote to memory of 3512 2368 WScript.exe 96 PID 2368 wrote to memory of 3512 2368 WScript.exe 96 PID 2368 wrote to memory of 3512 2368 WScript.exe 96 PID 3512 wrote to memory of 4020 3512 svchcst.exe 97 PID 3512 wrote to memory of 4020 3512 svchcst.exe 97 PID 3512 wrote to memory of 4020 3512 svchcst.exe 97 PID 3512 wrote to memory of 4528 3512 svchcst.exe 98 PID 3512 wrote to memory of 4528 3512 svchcst.exe 98 PID 3512 wrote to memory of 4528 3512 svchcst.exe 98 PID 4020 wrote to memory of 4396 4020 WScript.exe 99 PID 4020 wrote to memory of 4396 4020 WScript.exe 99 PID 4020 wrote to memory of 4396 4020 WScript.exe 99 PID 4396 wrote to memory of 4540 4396 svchcst.exe 100 PID 4396 wrote to memory of 4540 4396 svchcst.exe 100 PID 4396 wrote to memory of 4540 4396 svchcst.exe 100 PID 4396 wrote to memory of 3272 4396 svchcst.exe 101 PID 4396 wrote to memory of 3272 4396 svchcst.exe 101 PID 4396 wrote to memory of 3272 4396 svchcst.exe 101 PID 3272 wrote to memory of 4572 3272 WScript.exe 104 PID 3272 wrote to memory of 4572 3272 WScript.exe 104 PID 3272 wrote to memory of 4572 3272 WScript.exe 104 PID 4540 wrote to memory of 4504 4540 WScript.exe 105 PID 4540 wrote to memory of 4504 4540 WScript.exe 105 PID 4540 wrote to memory of 4504 4540 WScript.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\b436a280cc349cd2e8c0e7a9f9ef1c9972e98cece35762ad2967396578d9dbae.exe"C:\Users\Admin\AppData\Local\Temp\b436a280cc349cd2e8c0e7a9f9ef1c9972e98cece35762ad2967396578d9dbae.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"4⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"6⤵PID:3112
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"6⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"8⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"10⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"11⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4504
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"10⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3272 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"11⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4572
-
-
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"8⤵PID:4528
-
-
-
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"4⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:452
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92B
MD567b9b3e2ded7086f393ebbc36c5e7bca
SHA1e6299d0450b9a92a18cc23b5704a2b475652c790
SHA25644063c266686263f14cd2a83fee124fb3e61a9171a6aab69709464f49511011d
SHA512826fbc9481f46b1ae3db828a665c55c349023caf563e6e8c17321f5f3af3e4c3914955db6f0eebfc6defe561315435d47310b4d0499ab9c2c85bb61264dedc09
-
Filesize
753B
MD5f38355102e31c9a42bf95d67810d73b2
SHA1ec61b89c33860b0f1174feb57bc509d495beb072
SHA256c03a116c8ad5742cd665eb6be837d0d45f0e34a06cd918ef40b2cc1b01864c9b
SHA51242e41dec8e647251a5428eed47de5390fd16b8b3ff020dd0ecf25eef6acc0a214004612ba8c2f8155b4aee70e205c06752942e901d2efec5a8493c0cc23e9eb1
-
Filesize
696B
MD506a252a9516053e44ec8e64f1ebf0533
SHA129ac97e0cdade946c4feb81ad3f78d70953a2277
SHA2566b8a799c3d4b977adb7220f6790b2ac09080ca3ccde5a2c33c83b33ea905928c
SHA5120775aabeef7c910e03efc40f96143025a2ee3544dd656c78d09ef63c85d040037752aabe72fdf3b636ee31422ae8de01b73c85e27247203d5efc1635eaf15b2d
-
Filesize
696B
MD557e51d7e4374cd875109b11b9b8deb29
SHA1aa5554bdcf8417f4b5fc9242f1de625e2fb820bf
SHA256054ccb4671ec5693715c290f0bed875878cda62addcb38ef21257c59037fe30a
SHA5126f58d52a71466d92d7da68e1bfdd91db03619d810eae2622b4e5623d2ad4e30e294d885c8c5405b775aa3256e3acbd0442a3bb2a4b6eb50001ee5f8848d66da3
-
Filesize
696B
MD581911744d71ed066085116eec2026095
SHA147cfe383cd90c80f367d20667fa26cd160507a8f
SHA2563154f7fe0c77b8441733285f257a444605ca5badb1148288aa7275033f75d3f5
SHA512e64925ee682737251c7d5f42a378a4f6c23a50a07a6811882547567725b59c172da356b235afc977d4c1e8209f5c1ba696b9dd54e7739f67a71c099c031d7396
-
Filesize
696B
MD50d7287608e57c918d75f595179c5fa29
SHA1d16c5add83d14855a0d674ca2d287ef0233e7062
SHA256539b077eb4ef610403f7c3cdec3fd11482b2a0c4f3c254c2e8f6f2a51905c9d1
SHA5120050624a5937e196a1e7d08318d9a499ea706cf8023bf7c6b1ba42a671e98e202ab83723740e9aab99bd6c17c3895ca1f2b17f6e94dd81d1d01c064b997c8bff
-
Filesize
1.1MB
MD5faa62985241da65ed5fb7b9b99b64a82
SHA12ae9b634b89cb49a789c79ea72a5f130cb31a044
SHA256b50d0c9e825324378131efd3db92a72e4b0f7004faab27608f26af86a162ccab
SHA512b5fa336d8d48e8502fb092ac82918f1b1351b02cbf5e76770ac91dad2341effd541107554b3de672b1b0fa3bec282e4069755f3f33c625a5dd45df3386d80ef6
-
Filesize
1.1MB
MD54464f07e0c0402de8820c18785d9cf2b
SHA18762d71fc0d64e1b1109050414cb880b525d54c6
SHA256db926c60ee892b29cbd25f5f001b9275fe45c2def6945dd5ecca4aab8994deb3
SHA512e9a1fb94d7251bdf857da64289d9b573e10e04d6bf2f533fa3c11c341c9146c906f05c2ffe026839253faa04be491165602b42236172dc2c03fe347fba9afea4
-
Filesize
1.1MB
MD510250b02aeb6d57430be5c74b3ef3622
SHA1d37f3a1dec15eb64ceb292061953cb70be9c1ae7
SHA256f0713848efc03dc386260fabda0c8dfcea7c16d03b06e426f7f689048cf22d97
SHA5124e65c58edad3eddee7b37ca38e35ccc1f0c0951ef5f932424b25afab2af01ee544b7620269da3870c5b3862c7c5f5c3cf51c21c81a9bbb1bf2ea6d13142bcc8f
-
Filesize
1.1MB
MD5f7fe89f9486a4ebdfd51d0805f4dc6ef
SHA19e7d3516087146018ff2acbed88f495128ec1298
SHA256c048cb10c580a3eb0b7b8ca7438fb4058a41edd79f425180519cb52b558ada63
SHA512e58b0fe8ceed14bf9ce85b0fd94697d9eed01532e6c4ce78a56b43c459544c8f4e2f4458107d847faecc274bce1d74b7b484922e9209c4bd0ead4cc15ed1cc35
-
Filesize
1.1MB
MD545f5452eced1be05ee33782c05daf072
SHA11b08baba81078ee00edf3ff22a2e10aa33b10289
SHA25698dd3d02775328feb5e563bb4cdc3d0f54483203f1a52484105515b59b3b692b
SHA5122cc3daab6fa5716fe005cb0a3494f65b180cd2f34a21ee3576949177276fe9e0cc082833e2bff08af6a79cdcea54ad13bf44a4372576ecce9fbf7c4a5270b815