Analysis

  • max time kernel
    5s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-06-2024 22:22

General

  • Target

    c78c17928a94298e4acd6b128ad61ed80b31105c79978d914c2a07f8899bb36c.exe

  • Size

    1.1MB

  • MD5

    7892f83675238e76b945e0a112abab24

  • SHA1

    10eeda2c9dba87199a1b0d1df81becb229bb5165

  • SHA256

    c78c17928a94298e4acd6b128ad61ed80b31105c79978d914c2a07f8899bb36c

  • SHA512

    264095c2338e4eb9fbe2c6bd4bcdd7febde75d2c37ca4cbc7134cc83ec9d6b8a7a394cd9656505bfa0843d4659623296c74193fce8de0fcfcbaf7f67d7a6a511

  • SSDEEP

    24576:CH0dl8myX9Bg42QoXFkrzkmmlSgRDko0lG4Z8r7Qfbkiu5QJ:CcaClSFlG4ZM7QzM6

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c78c17928a94298e4acd6b128ad61ed80b31105c79978d914c2a07f8899bb36c.exe
    "C:\Users\Admin\AppData\Local\Temp\c78c17928a94298e4acd6b128ad61ed80b31105c79978d914c2a07f8899bb36c.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2064
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
      2⤵
        PID:1144
        • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
          "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
          3⤵
            PID:4460
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
          2⤵
            PID:3040
            • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
              "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
              3⤵
                PID:1700
            • C:\Windows\SysWOW64\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
              2⤵
                PID:4072
                • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                  "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                  3⤵
                    PID:1644
                • C:\Windows\SysWOW64\WScript.exe
                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                  2⤵
                    PID:4004
                    • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                      "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                      3⤵
                        PID:4840

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

                    Filesize

                    753B

                    MD5

                    851a1279f6a0a7124133100e85cc2222

                    SHA1

                    cbd3ac48e9885023cacb35fd153b6a238aa78508

                    SHA256

                    312764a3847c47dbad66d55b5e4d454afe818763fd361d436374ac7e088a6705

                    SHA512

                    c915fe38a2888814d3125c2571307079d0c7576aaf365581b0b5bc95ef2e63b9ea20bc3e244a2a792f58ecb1d0a1a0e940901b87be04f73adbd226e88d97a930

                  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

                    Filesize

                    1.1MB

                    MD5

                    05cf99fbfac77b54288ba12ce487c5be

                    SHA1

                    f756628072be7d83c7af62efe150f32c6a331021

                    SHA256

                    28eafc22a45e73e1503b25c058f237635754eacc22553912b8879172b1b2f355

                    SHA512

                    fd543e7ca742f202ec30ba1364618933d579c3856b6010f5dc2927cdb1d24c2d9335475e4a281ae34b94bed2d249c347dc5b967be4f9c58d14bbf53647fa953e

                  • memory/2064-14-0x0000000000400000-0x0000000000551000-memory.dmp

                    Filesize

                    1.3MB