Analysis
-
max time kernel
5s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
30-06-2024 22:22
Static task
static1
Behavioral task
behavioral1
Sample
c78c17928a94298e4acd6b128ad61ed80b31105c79978d914c2a07f8899bb36c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c78c17928a94298e4acd6b128ad61ed80b31105c79978d914c2a07f8899bb36c.exe
Resource
win10v2004-20240611-en
General
-
Target
c78c17928a94298e4acd6b128ad61ed80b31105c79978d914c2a07f8899bb36c.exe
-
Size
1.1MB
-
MD5
7892f83675238e76b945e0a112abab24
-
SHA1
10eeda2c9dba87199a1b0d1df81becb229bb5165
-
SHA256
c78c17928a94298e4acd6b128ad61ed80b31105c79978d914c2a07f8899bb36c
-
SHA512
264095c2338e4eb9fbe2c6bd4bcdd7febde75d2c37ca4cbc7134cc83ec9d6b8a7a394cd9656505bfa0843d4659623296c74193fce8de0fcfcbaf7f67d7a6a511
-
SSDEEP
24576:CH0dl8myX9Bg42QoXFkrzkmmlSgRDko0lG4Z8r7Qfbkiu5QJ:CcaClSFlG4ZM7QzM6
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation c78c17928a94298e4acd6b128ad61ed80b31105c79978d914c2a07f8899bb36c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000_Classes\Local Settings c78c17928a94298e4acd6b128ad61ed80b31105c79978d914c2a07f8899bb36c.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2064 c78c17928a94298e4acd6b128ad61ed80b31105c79978d914c2a07f8899bb36c.exe 2064 c78c17928a94298e4acd6b128ad61ed80b31105c79978d914c2a07f8899bb36c.exe 2064 c78c17928a94298e4acd6b128ad61ed80b31105c79978d914c2a07f8899bb36c.exe 2064 c78c17928a94298e4acd6b128ad61ed80b31105c79978d914c2a07f8899bb36c.exe 2064 c78c17928a94298e4acd6b128ad61ed80b31105c79978d914c2a07f8899bb36c.exe 2064 c78c17928a94298e4acd6b128ad61ed80b31105c79978d914c2a07f8899bb36c.exe 2064 c78c17928a94298e4acd6b128ad61ed80b31105c79978d914c2a07f8899bb36c.exe 2064 c78c17928a94298e4acd6b128ad61ed80b31105c79978d914c2a07f8899bb36c.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2064 c78c17928a94298e4acd6b128ad61ed80b31105c79978d914c2a07f8899bb36c.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2064 c78c17928a94298e4acd6b128ad61ed80b31105c79978d914c2a07f8899bb36c.exe 2064 c78c17928a94298e4acd6b128ad61ed80b31105c79978d914c2a07f8899bb36c.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2064 wrote to memory of 1144 2064 c78c17928a94298e4acd6b128ad61ed80b31105c79978d914c2a07f8899bb36c.exe 87 PID 2064 wrote to memory of 1144 2064 c78c17928a94298e4acd6b128ad61ed80b31105c79978d914c2a07f8899bb36c.exe 87 PID 2064 wrote to memory of 1144 2064 c78c17928a94298e4acd6b128ad61ed80b31105c79978d914c2a07f8899bb36c.exe 87 PID 2064 wrote to memory of 3040 2064 c78c17928a94298e4acd6b128ad61ed80b31105c79978d914c2a07f8899bb36c.exe 88 PID 2064 wrote to memory of 3040 2064 c78c17928a94298e4acd6b128ad61ed80b31105c79978d914c2a07f8899bb36c.exe 88 PID 2064 wrote to memory of 3040 2064 c78c17928a94298e4acd6b128ad61ed80b31105c79978d914c2a07f8899bb36c.exe 88 PID 2064 wrote to memory of 4072 2064 c78c17928a94298e4acd6b128ad61ed80b31105c79978d914c2a07f8899bb36c.exe 89 PID 2064 wrote to memory of 4072 2064 c78c17928a94298e4acd6b128ad61ed80b31105c79978d914c2a07f8899bb36c.exe 89 PID 2064 wrote to memory of 4072 2064 c78c17928a94298e4acd6b128ad61ed80b31105c79978d914c2a07f8899bb36c.exe 89 PID 2064 wrote to memory of 4004 2064 c78c17928a94298e4acd6b128ad61ed80b31105c79978d914c2a07f8899bb36c.exe 90 PID 2064 wrote to memory of 4004 2064 c78c17928a94298e4acd6b128ad61ed80b31105c79978d914c2a07f8899bb36c.exe 90 PID 2064 wrote to memory of 4004 2064 c78c17928a94298e4acd6b128ad61ed80b31105c79978d914c2a07f8899bb36c.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\c78c17928a94298e4acd6b128ad61ed80b31105c79978d914c2a07f8899bb36c.exe"C:\Users\Admin\AppData\Local\Temp\c78c17928a94298e4acd6b128ad61ed80b31105c79978d914c2a07f8899bb36c.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:1144
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:4460
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:3040
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:1700
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:4072
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:1644
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:4004
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:4840
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
753B
MD5851a1279f6a0a7124133100e85cc2222
SHA1cbd3ac48e9885023cacb35fd153b6a238aa78508
SHA256312764a3847c47dbad66d55b5e4d454afe818763fd361d436374ac7e088a6705
SHA512c915fe38a2888814d3125c2571307079d0c7576aaf365581b0b5bc95ef2e63b9ea20bc3e244a2a792f58ecb1d0a1a0e940901b87be04f73adbd226e88d97a930
-
Filesize
1.1MB
MD505cf99fbfac77b54288ba12ce487c5be
SHA1f756628072be7d83c7af62efe150f32c6a331021
SHA25628eafc22a45e73e1503b25c058f237635754eacc22553912b8879172b1b2f355
SHA512fd543e7ca742f202ec30ba1364618933d579c3856b6010f5dc2927cdb1d24c2d9335475e4a281ae34b94bed2d249c347dc5b967be4f9c58d14bbf53647fa953e