Analysis

  • max time kernel
    6s
  • max time network
    112s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-06-2024 21:22

General

  • Target

    b6ed85c244178707f3f6fc0abea61fcede037a707d4beef41a4d381d6c23f805.exe

  • Size

    1.1MB

  • MD5

    53b10c82c21876fb4e7824c78209222e

  • SHA1

    73ceb90fda7691077aa33c0bf3d04d52ef7485c7

  • SHA256

    b6ed85c244178707f3f6fc0abea61fcede037a707d4beef41a4d381d6c23f805

  • SHA512

    fa11693fe44ea483089dddc70dc80cf9a884d2c8ea3edc95b47dacb58f482d5621c0cb3cf5e432e8c7b49ffd6ba8db719ed5c264a9f5f13b9612d2146532854b

  • SSDEEP

    24576:CH0dl8myX9Bg42QoXFkrzkmmlSgRDko0lG4Z8r7Qfbkiu5QT:CcaClSFlG4ZM7QzMk

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b6ed85c244178707f3f6fc0abea61fcede037a707d4beef41a4d381d6c23f805.exe
    "C:\Users\Admin\AppData\Local\Temp\b6ed85c244178707f3f6fc0abea61fcede037a707d4beef41a4d381d6c23f805.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4520
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
      2⤵
        PID:3268
        • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
          "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
          3⤵
            PID:1188
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
          2⤵
            PID:4176
            • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
              "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
              3⤵
                PID:3964
            • C:\Windows\SysWOW64\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
              2⤵
                PID:4492
                • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                  "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                  3⤵
                    PID:3260
                • C:\Windows\SysWOW64\WScript.exe
                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                  2⤵
                    PID:4264
                    • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                      "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                      3⤵
                        PID:1952

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

                    Filesize

                    753B

                    MD5

                    bd6a7ff8715f04c7402b4663d656e91c

                    SHA1

                    aba8195d98b23a6637a58ab0d888a06497f9ee9b

                    SHA256

                    650ec902b850f10fc91fbed980b2d87978e54b8dd17c8939415c751fbfbd3888

                    SHA512

                    e7a5d949961f61ef548373da8b34508c61e9fb25f5e7d908610435772b0d9aa8ef6291cc83f247ffdfc2b8fce91a1e3837555b15f26c0fe2ee8ebaeff13e1c52

                  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

                    Filesize

                    1.1MB

                    MD5

                    d5d6275653ab41d8cc87f27dd3408b97

                    SHA1

                    fe9f781e8e4cd3095902160df6786fcbdaf838f1

                    SHA256

                    d09cf8ecab52d1fe2035f183938f1380a196471ed981f3f9d3ab9dde0936fee7

                    SHA512

                    6c356947db084722db7b6554c716edccbc54287414366bb9e904ede9da3a0f97f8d340ce7101eb28092fba933d8d38bf800c1116cfca70b2ae6830a076170175

                  • memory/4520-14-0x0000000000400000-0x0000000000551000-memory.dmp

                    Filesize

                    1.3MB