Analysis

  • max time kernel
    93s
  • max time network
    98s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/06/2024, 21:22

General

  • Target

    b436a280cc349cd2e8c0e7a9f9ef1c9972e98cece35762ad2967396578d9dbae.exe

  • Size

    1.1MB

  • MD5

    c4dd9e340824e1cb2b64bb1b54a57c77

  • SHA1

    2a9529ba8dba19db43f1455f63c513c6f55fedce

  • SHA256

    b436a280cc349cd2e8c0e7a9f9ef1c9972e98cece35762ad2967396578d9dbae

  • SHA512

    3c6129191d10b3bdfc2ef206cd2f2010342554a5ef263a61b151923a0f45c463b73d5c77a6a82c76c511cd7bb5c50b6eb10bd2a4714394b67d1df5f4c03abe26

  • SSDEEP

    24576:aH0dl8myX9Bg42QoXFkrzkmplSgRDYo0lG4Z8r7Qfbkiu5Qn:acallSllG4ZM7QzMw

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 12 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 12 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 16 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b436a280cc349cd2e8c0e7a9f9ef1c9972e98cece35762ad2967396578d9dbae.exe
    "C:\Users\Admin\AppData\Local\Temp\b436a280cc349cd2e8c0e7a9f9ef1c9972e98cece35762ad2967396578d9dbae.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1088
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
      2⤵
      • Checks computer location settings
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:3460
      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
        3⤵
        • Checks computer location settings
        • Deletes itself
        • Executes dropped EXE
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1916
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
          4⤵
          • Checks computer location settings
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:4228
          • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Modifies registry class
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:4024
            • C:\Windows\SysWOW64\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
              6⤵
                PID:3112
              • C:\Windows\SysWOW64\WScript.exe
                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                6⤵
                • Checks computer location settings
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:2368
                • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                  "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                  7⤵
                  • Checks computer location settings
                  • Executes dropped EXE
                  • Modifies registry class
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:3512
                  • C:\Windows\SysWOW64\WScript.exe
                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                    8⤵
                    • Checks computer location settings
                    • Modifies registry class
                    • Suspicious use of WriteProcessMemory
                    PID:4020
                    • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                      "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                      9⤵
                      • Checks computer location settings
                      • Executes dropped EXE
                      • Modifies registry class
                      • Suspicious use of SetWindowsHookEx
                      • Suspicious use of WriteProcessMemory
                      PID:4396
                      • C:\Windows\SysWOW64\WScript.exe
                        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                        10⤵
                        • Checks computer location settings
                        • Modifies registry class
                        • Suspicious use of WriteProcessMemory
                        PID:4540
                        • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                          "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                          11⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          PID:4504
                      • C:\Windows\SysWOW64\WScript.exe
                        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                        10⤵
                        • Checks computer location settings
                        • Modifies registry class
                        • Suspicious use of WriteProcessMemory
                        PID:3272
                        • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                          "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                          11⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          PID:4572
                  • C:\Windows\SysWOW64\WScript.exe
                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                    8⤵
                      PID:4528
            • C:\Windows\SysWOW64\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
              4⤵
              • Checks computer location settings
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:3180
              • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:452

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\Microsoft\Config.ini

        Filesize

        92B

        MD5

        67b9b3e2ded7086f393ebbc36c5e7bca

        SHA1

        e6299d0450b9a92a18cc23b5704a2b475652c790

        SHA256

        44063c266686263f14cd2a83fee124fb3e61a9171a6aab69709464f49511011d

        SHA512

        826fbc9481f46b1ae3db828a665c55c349023caf563e6e8c17321f5f3af3e4c3914955db6f0eebfc6defe561315435d47310b4d0499ab9c2c85bb61264dedc09

      • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

        Filesize

        753B

        MD5

        f38355102e31c9a42bf95d67810d73b2

        SHA1

        ec61b89c33860b0f1174feb57bc509d495beb072

        SHA256

        c03a116c8ad5742cd665eb6be837d0d45f0e34a06cd918ef40b2cc1b01864c9b

        SHA512

        42e41dec8e647251a5428eed47de5390fd16b8b3ff020dd0ecf25eef6acc0a214004612ba8c2f8155b4aee70e205c06752942e901d2efec5a8493c0cc23e9eb1

      • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

        Filesize

        696B

        MD5

        06a252a9516053e44ec8e64f1ebf0533

        SHA1

        29ac97e0cdade946c4feb81ad3f78d70953a2277

        SHA256

        6b8a799c3d4b977adb7220f6790b2ac09080ca3ccde5a2c33c83b33ea905928c

        SHA512

        0775aabeef7c910e03efc40f96143025a2ee3544dd656c78d09ef63c85d040037752aabe72fdf3b636ee31422ae8de01b73c85e27247203d5efc1635eaf15b2d

      • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

        Filesize

        696B

        MD5

        57e51d7e4374cd875109b11b9b8deb29

        SHA1

        aa5554bdcf8417f4b5fc9242f1de625e2fb820bf

        SHA256

        054ccb4671ec5693715c290f0bed875878cda62addcb38ef21257c59037fe30a

        SHA512

        6f58d52a71466d92d7da68e1bfdd91db03619d810eae2622b4e5623d2ad4e30e294d885c8c5405b775aa3256e3acbd0442a3bb2a4b6eb50001ee5f8848d66da3

      • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

        Filesize

        696B

        MD5

        81911744d71ed066085116eec2026095

        SHA1

        47cfe383cd90c80f367d20667fa26cd160507a8f

        SHA256

        3154f7fe0c77b8441733285f257a444605ca5badb1148288aa7275033f75d3f5

        SHA512

        e64925ee682737251c7d5f42a378a4f6c23a50a07a6811882547567725b59c172da356b235afc977d4c1e8209f5c1ba696b9dd54e7739f67a71c099c031d7396

      • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

        Filesize

        696B

        MD5

        0d7287608e57c918d75f595179c5fa29

        SHA1

        d16c5add83d14855a0d674ca2d287ef0233e7062

        SHA256

        539b077eb4ef610403f7c3cdec3fd11482b2a0c4f3c254c2e8f6f2a51905c9d1

        SHA512

        0050624a5937e196a1e7d08318d9a499ea706cf8023bf7c6b1ba42a671e98e202ab83723740e9aab99bd6c17c3895ca1f2b17f6e94dd81d1d01c064b997c8bff

      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

        Filesize

        1.1MB

        MD5

        faa62985241da65ed5fb7b9b99b64a82

        SHA1

        2ae9b634b89cb49a789c79ea72a5f130cb31a044

        SHA256

        b50d0c9e825324378131efd3db92a72e4b0f7004faab27608f26af86a162ccab

        SHA512

        b5fa336d8d48e8502fb092ac82918f1b1351b02cbf5e76770ac91dad2341effd541107554b3de672b1b0fa3bec282e4069755f3f33c625a5dd45df3386d80ef6

      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

        Filesize

        1.1MB

        MD5

        4464f07e0c0402de8820c18785d9cf2b

        SHA1

        8762d71fc0d64e1b1109050414cb880b525d54c6

        SHA256

        db926c60ee892b29cbd25f5f001b9275fe45c2def6945dd5ecca4aab8994deb3

        SHA512

        e9a1fb94d7251bdf857da64289d9b573e10e04d6bf2f533fa3c11c341c9146c906f05c2ffe026839253faa04be491165602b42236172dc2c03fe347fba9afea4

      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

        Filesize

        1.1MB

        MD5

        10250b02aeb6d57430be5c74b3ef3622

        SHA1

        d37f3a1dec15eb64ceb292061953cb70be9c1ae7

        SHA256

        f0713848efc03dc386260fabda0c8dfcea7c16d03b06e426f7f689048cf22d97

        SHA512

        4e65c58edad3eddee7b37ca38e35ccc1f0c0951ef5f932424b25afab2af01ee544b7620269da3870c5b3862c7c5f5c3cf51c21c81a9bbb1bf2ea6d13142bcc8f

      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

        Filesize

        1.1MB

        MD5

        f7fe89f9486a4ebdfd51d0805f4dc6ef

        SHA1

        9e7d3516087146018ff2acbed88f495128ec1298

        SHA256

        c048cb10c580a3eb0b7b8ca7438fb4058a41edd79f425180519cb52b558ada63

        SHA512

        e58b0fe8ceed14bf9ce85b0fd94697d9eed01532e6c4ce78a56b43c459544c8f4e2f4458107d847faecc274bce1d74b7b484922e9209c4bd0ead4cc15ed1cc35

      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

        Filesize

        1.1MB

        MD5

        45f5452eced1be05ee33782c05daf072

        SHA1

        1b08baba81078ee00edf3ff22a2e10aa33b10289

        SHA256

        98dd3d02775328feb5e563bb4cdc3d0f54483203f1a52484105515b59b3b692b

        SHA512

        2cc3daab6fa5716fe005cb0a3494f65b180cd2f34a21ee3576949177276fe9e0cc082833e2bff08af6a79cdcea54ad13bf44a4372576ecce9fbf7c4a5270b815

      • memory/452-27-0x0000000000400000-0x000000000055F000-memory.dmp

        Filesize

        1.4MB

      • memory/452-28-0x0000000000400000-0x000000000055F000-memory.dmp

        Filesize

        1.4MB

      • memory/1088-0-0x0000000000400000-0x000000000055F000-memory.dmp

        Filesize

        1.4MB

      • memory/1088-9-0x0000000000400000-0x000000000055F000-memory.dmp

        Filesize

        1.4MB

      • memory/1916-22-0x0000000000400000-0x000000000055F000-memory.dmp

        Filesize

        1.4MB

      • memory/3512-51-0x0000000000400000-0x000000000055F000-memory.dmp

        Filesize

        1.4MB

      • memory/3512-41-0x0000000000400000-0x000000000055F000-memory.dmp

        Filesize

        1.4MB

      • memory/4024-38-0x0000000000400000-0x000000000055F000-memory.dmp

        Filesize

        1.4MB

      • memory/4024-25-0x0000000000400000-0x000000000055F000-memory.dmp

        Filesize

        1.4MB

      • memory/4396-54-0x0000000000400000-0x000000000055F000-memory.dmp

        Filesize

        1.4MB

      • memory/4396-62-0x0000000000400000-0x000000000055F000-memory.dmp

        Filesize

        1.4MB

      • memory/4504-66-0x0000000000400000-0x000000000055F000-memory.dmp

        Filesize

        1.4MB

      • memory/4504-68-0x0000000000400000-0x000000000055F000-memory.dmp

        Filesize

        1.4MB

      • memory/4572-67-0x0000000000400000-0x000000000055F000-memory.dmp

        Filesize

        1.4MB