Analysis
-
max time kernel
95s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
06-07-2024 21:05
Static task
static1
Behavioral task
behavioral1
Sample
6921f25c7fc434c26e3f72254279cc093926dfc76729ff93effdf0575f5e261e.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
6921f25c7fc434c26e3f72254279cc093926dfc76729ff93effdf0575f5e261e.exe
Resource
win10v2004-20240704-en
General
-
Target
6921f25c7fc434c26e3f72254279cc093926dfc76729ff93effdf0575f5e261e.exe
-
Size
1.1MB
-
MD5
46dc83238b43db8b1e3c494fd107bcde
-
SHA1
2828ba3109f07f711987b7686499577152e0a53b
-
SHA256
6921f25c7fc434c26e3f72254279cc093926dfc76729ff93effdf0575f5e261e
-
SHA512
f4e14c48acca27f7d3eae2cb45f85a8287e2d6ea25e75f2c3d35f1aedb2063ae6066f4aa1feb95e60063a99a87a48008c7f8738923d9e3571142d8e193e0457f
-
SSDEEP
24576:CH0dl8myX9Bg42QoXFkrzkmmlSgRDko0lG4Z8r7Qfbkiu5Qp:CcaClSFlG4ZM7QzM6
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation 6921f25c7fc434c26e3f72254279cc093926dfc76729ff93effdf0575f5e261e.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation WScript.exe -
Deletes itself 1 IoCs
pid Process 4072 svchcst.exe -
Executes dropped EXE 2 IoCs
pid Process 4072 svchcst.exe 3832 svchcst.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000_Classes\Local Settings 6921f25c7fc434c26e3f72254279cc093926dfc76729ff93effdf0575f5e261e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4940 6921f25c7fc434c26e3f72254279cc093926dfc76729ff93effdf0575f5e261e.exe 4940 6921f25c7fc434c26e3f72254279cc093926dfc76729ff93effdf0575f5e261e.exe 4940 6921f25c7fc434c26e3f72254279cc093926dfc76729ff93effdf0575f5e261e.exe 4940 6921f25c7fc434c26e3f72254279cc093926dfc76729ff93effdf0575f5e261e.exe 4072 svchcst.exe 4072 svchcst.exe 4072 svchcst.exe 4072 svchcst.exe 4072 svchcst.exe 4072 svchcst.exe 4072 svchcst.exe 4072 svchcst.exe 4072 svchcst.exe 4072 svchcst.exe 4072 svchcst.exe 4072 svchcst.exe 4072 svchcst.exe 4072 svchcst.exe 4072 svchcst.exe 4072 svchcst.exe 4072 svchcst.exe 4072 svchcst.exe 4072 svchcst.exe 4072 svchcst.exe 4072 svchcst.exe 4072 svchcst.exe 4072 svchcst.exe 4072 svchcst.exe 4072 svchcst.exe 4072 svchcst.exe 4072 svchcst.exe 4072 svchcst.exe 4072 svchcst.exe 4072 svchcst.exe 4072 svchcst.exe 4072 svchcst.exe 4072 svchcst.exe 4072 svchcst.exe 4072 svchcst.exe 4072 svchcst.exe 4072 svchcst.exe 4072 svchcst.exe 4072 svchcst.exe 4072 svchcst.exe 4072 svchcst.exe 4072 svchcst.exe 4072 svchcst.exe 4072 svchcst.exe 4072 svchcst.exe 4072 svchcst.exe 4072 svchcst.exe 4072 svchcst.exe 4072 svchcst.exe 4072 svchcst.exe 4072 svchcst.exe 4072 svchcst.exe 4072 svchcst.exe 4072 svchcst.exe 4072 svchcst.exe 4072 svchcst.exe 4072 svchcst.exe 4072 svchcst.exe 4072 svchcst.exe 4072 svchcst.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4940 6921f25c7fc434c26e3f72254279cc093926dfc76729ff93effdf0575f5e261e.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4940 6921f25c7fc434c26e3f72254279cc093926dfc76729ff93effdf0575f5e261e.exe 4940 6921f25c7fc434c26e3f72254279cc093926dfc76729ff93effdf0575f5e261e.exe 4072 svchcst.exe 4072 svchcst.exe 3832 svchcst.exe 3832 svchcst.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4940 wrote to memory of 744 4940 6921f25c7fc434c26e3f72254279cc093926dfc76729ff93effdf0575f5e261e.exe 85 PID 4940 wrote to memory of 744 4940 6921f25c7fc434c26e3f72254279cc093926dfc76729ff93effdf0575f5e261e.exe 85 PID 4940 wrote to memory of 744 4940 6921f25c7fc434c26e3f72254279cc093926dfc76729ff93effdf0575f5e261e.exe 85 PID 4940 wrote to memory of 912 4940 6921f25c7fc434c26e3f72254279cc093926dfc76729ff93effdf0575f5e261e.exe 86 PID 4940 wrote to memory of 912 4940 6921f25c7fc434c26e3f72254279cc093926dfc76729ff93effdf0575f5e261e.exe 86 PID 4940 wrote to memory of 912 4940 6921f25c7fc434c26e3f72254279cc093926dfc76729ff93effdf0575f5e261e.exe 86 PID 912 wrote to memory of 4072 912 WScript.exe 88 PID 912 wrote to memory of 4072 912 WScript.exe 88 PID 912 wrote to memory of 4072 912 WScript.exe 88 PID 744 wrote to memory of 3832 744 WScript.exe 89 PID 744 wrote to memory of 3832 744 WScript.exe 89 PID 744 wrote to memory of 3832 744 WScript.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\6921f25c7fc434c26e3f72254279cc093926dfc76729ff93effdf0575f5e261e.exe"C:\Users\Admin\AppData\Local\Temp\6921f25c7fc434c26e3f72254279cc093926dfc76729ff93effdf0575f5e261e.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3832
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4072
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
753B
MD53132a9f88f67a3de9b97b96826a47754
SHA1292386f712436881c44a081488ddfa25d0697c02
SHA25642bab0fb569bdaf45e29f26089fadb002848f4910da1e524a1dc487a78f0545f
SHA5129cb157c81135b5d239106c62506ecf90faf699b32dde45cc46635b1db338e4a632ab71bdbcd533f834972b96b680a7e524f15622476a719b9ea66d825638e79b
-
Filesize
1.1MB
MD5f832555dc6bbbed8776dc1714fe8c1f1
SHA16cadf9f9a080cd04639685335c0fd9306c4efe68
SHA25678b0a7ccaf704c2f5e3ae884ac9f70374119a973ffe89fde0e173f64a02396a8
SHA512693f2d20c3806fb3028cf4801dcd9a3166145fac01831a307ba18cf2255c79517addb79398561108a58e429298d1917e87367af087388c4a6a097fc2dcc7f4e3