Analysis
-
max time kernel
6s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
30-06-2024 21:22
Static task
static1
Behavioral task
behavioral1
Sample
b6ed85c244178707f3f6fc0abea61fcede037a707d4beef41a4d381d6c23f805.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
b6ed85c244178707f3f6fc0abea61fcede037a707d4beef41a4d381d6c23f805.exe
Resource
win10v2004-20240611-en
General
-
Target
b6ed85c244178707f3f6fc0abea61fcede037a707d4beef41a4d381d6c23f805.exe
-
Size
1.1MB
-
MD5
53b10c82c21876fb4e7824c78209222e
-
SHA1
73ceb90fda7691077aa33c0bf3d04d52ef7485c7
-
SHA256
b6ed85c244178707f3f6fc0abea61fcede037a707d4beef41a4d381d6c23f805
-
SHA512
fa11693fe44ea483089dddc70dc80cf9a884d2c8ea3edc95b47dacb58f482d5621c0cb3cf5e432e8c7b49ffd6ba8db719ed5c264a9f5f13b9612d2146532854b
-
SSDEEP
24576:CH0dl8myX9Bg42QoXFkrzkmmlSgRDko0lG4Z8r7Qfbkiu5QT:CcaClSFlG4ZM7QzMk
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation b6ed85c244178707f3f6fc0abea61fcede037a707d4beef41a4d381d6c23f805.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000_Classes\Local Settings b6ed85c244178707f3f6fc0abea61fcede037a707d4beef41a4d381d6c23f805.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4520 b6ed85c244178707f3f6fc0abea61fcede037a707d4beef41a4d381d6c23f805.exe 4520 b6ed85c244178707f3f6fc0abea61fcede037a707d4beef41a4d381d6c23f805.exe 4520 b6ed85c244178707f3f6fc0abea61fcede037a707d4beef41a4d381d6c23f805.exe 4520 b6ed85c244178707f3f6fc0abea61fcede037a707d4beef41a4d381d6c23f805.exe 4520 b6ed85c244178707f3f6fc0abea61fcede037a707d4beef41a4d381d6c23f805.exe 4520 b6ed85c244178707f3f6fc0abea61fcede037a707d4beef41a4d381d6c23f805.exe 4520 b6ed85c244178707f3f6fc0abea61fcede037a707d4beef41a4d381d6c23f805.exe 4520 b6ed85c244178707f3f6fc0abea61fcede037a707d4beef41a4d381d6c23f805.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4520 b6ed85c244178707f3f6fc0abea61fcede037a707d4beef41a4d381d6c23f805.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4520 b6ed85c244178707f3f6fc0abea61fcede037a707d4beef41a4d381d6c23f805.exe 4520 b6ed85c244178707f3f6fc0abea61fcede037a707d4beef41a4d381d6c23f805.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4520 wrote to memory of 3268 4520 b6ed85c244178707f3f6fc0abea61fcede037a707d4beef41a4d381d6c23f805.exe 86 PID 4520 wrote to memory of 3268 4520 b6ed85c244178707f3f6fc0abea61fcede037a707d4beef41a4d381d6c23f805.exe 86 PID 4520 wrote to memory of 3268 4520 b6ed85c244178707f3f6fc0abea61fcede037a707d4beef41a4d381d6c23f805.exe 86 PID 4520 wrote to memory of 4176 4520 b6ed85c244178707f3f6fc0abea61fcede037a707d4beef41a4d381d6c23f805.exe 87 PID 4520 wrote to memory of 4176 4520 b6ed85c244178707f3f6fc0abea61fcede037a707d4beef41a4d381d6c23f805.exe 87 PID 4520 wrote to memory of 4176 4520 b6ed85c244178707f3f6fc0abea61fcede037a707d4beef41a4d381d6c23f805.exe 87 PID 4520 wrote to memory of 4492 4520 b6ed85c244178707f3f6fc0abea61fcede037a707d4beef41a4d381d6c23f805.exe 88 PID 4520 wrote to memory of 4492 4520 b6ed85c244178707f3f6fc0abea61fcede037a707d4beef41a4d381d6c23f805.exe 88 PID 4520 wrote to memory of 4492 4520 b6ed85c244178707f3f6fc0abea61fcede037a707d4beef41a4d381d6c23f805.exe 88 PID 4520 wrote to memory of 4264 4520 b6ed85c244178707f3f6fc0abea61fcede037a707d4beef41a4d381d6c23f805.exe 89 PID 4520 wrote to memory of 4264 4520 b6ed85c244178707f3f6fc0abea61fcede037a707d4beef41a4d381d6c23f805.exe 89 PID 4520 wrote to memory of 4264 4520 b6ed85c244178707f3f6fc0abea61fcede037a707d4beef41a4d381d6c23f805.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\b6ed85c244178707f3f6fc0abea61fcede037a707d4beef41a4d381d6c23f805.exe"C:\Users\Admin\AppData\Local\Temp\b6ed85c244178707f3f6fc0abea61fcede037a707d4beef41a4d381d6c23f805.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:3268
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:1188
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:4176
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:3964
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:4492
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:3260
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:4264
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:1952
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
753B
MD5bd6a7ff8715f04c7402b4663d656e91c
SHA1aba8195d98b23a6637a58ab0d888a06497f9ee9b
SHA256650ec902b850f10fc91fbed980b2d87978e54b8dd17c8939415c751fbfbd3888
SHA512e7a5d949961f61ef548373da8b34508c61e9fb25f5e7d908610435772b0d9aa8ef6291cc83f247ffdfc2b8fce91a1e3837555b15f26c0fe2ee8ebaeff13e1c52
-
Filesize
1.1MB
MD5d5d6275653ab41d8cc87f27dd3408b97
SHA1fe9f781e8e4cd3095902160df6786fcbdaf838f1
SHA256d09cf8ecab52d1fe2035f183938f1380a196471ed981f3f9d3ab9dde0936fee7
SHA5126c356947db084722db7b6554c716edccbc54287414366bb9e904ede9da3a0f97f8d340ce7101eb28092fba933d8d38bf800c1116cfca70b2ae6830a076170175