Analysis

  • max time kernel
    119s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    09/07/2024, 06:05

General

  • Target

    c91d512a7d7b08354012e6ba15e6d5f08c613cbcec6b48cddbca89f6650486a2.exe

  • Size

    1.1MB

  • MD5

    9812e95215aed15de740ace8eede2357

  • SHA1

    3aaa0bbbb9d512f6e63e4e5b2231bcd40582f910

  • SHA256

    c91d512a7d7b08354012e6ba15e6d5f08c613cbcec6b48cddbca89f6650486a2

  • SHA512

    d92e2961132d2b1e112ec5d0b5949f772eea736fe8f3753686e464f2f5aec56555c51d1667ee4b780c90ef348d5b898962b013b1cc95718e718142c88a657d22

  • SSDEEP

    24576:aH0dl8myX9Bg42QoXFkrzkmplSgRDYo0lG4Z8r7Qfbkiu5Qp:acallSllG4ZM7QzMq

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 11 IoCs
  • Loads dropped DLL 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c91d512a7d7b08354012e6ba15e6d5f08c613cbcec6b48cddbca89f6650486a2.exe
    "C:\Users\Admin\AppData\Local\Temp\c91d512a7d7b08354012e6ba15e6d5f08c613cbcec6b48cddbca89f6650486a2.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2748
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2840
      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
        3⤵
        • Deletes itself
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3068
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
          4⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1592
          • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2052
            • C:\Windows\SysWOW64\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
              6⤵
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:2892
              • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:2796
                • C:\Windows\SysWOW64\WScript.exe
                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                  8⤵
                  • Loads dropped DLL
                  • Suspicious use of WriteProcessMemory
                  PID:2016
                  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                    "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                    9⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    • Suspicious use of WriteProcessMemory
                    PID:2228
                    • C:\Windows\SysWOW64\WScript.exe
                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                      10⤵
                      • Loads dropped DLL
                      • Suspicious use of WriteProcessMemory
                      PID:1696
                      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                        "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                        11⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        • Suspicious use of WriteProcessMemory
                        PID:1788
                        • C:\Windows\SysWOW64\WScript.exe
                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                          12⤵
                          • Loads dropped DLL
                          • Suspicious use of WriteProcessMemory
                          PID:1652
                          • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                            "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                            13⤵
                            • Executes dropped EXE
                            • Suspicious use of SetWindowsHookEx
                            • Suspicious use of WriteProcessMemory
                            PID:3040
                            • C:\Windows\SysWOW64\WScript.exe
                              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                              14⤵
                              • Loads dropped DLL
                              • Suspicious use of WriteProcessMemory
                              PID:684
                              • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                15⤵
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                • Suspicious use of WriteProcessMemory
                                PID:2828
                                • C:\Windows\SysWOW64\WScript.exe
                                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                  16⤵
                                    PID:2760
                                  • C:\Windows\SysWOW64\WScript.exe
                                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                    16⤵
                                    • Loads dropped DLL
                                    PID:2748
                                    • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                      "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                      17⤵
                                      • Executes dropped EXE
                                      • Suspicious use of SetWindowsHookEx
                                      PID:576
                                      • C:\Windows\SysWOW64\WScript.exe
                                        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                        18⤵
                                        • Loads dropped DLL
                                        PID:1068
                                        • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                          "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                          19⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetWindowsHookEx
                                          PID:2924
                                    • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                      "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                      17⤵
                                      • Executes dropped EXE
                                      • Suspicious use of SetWindowsHookEx
                                      PID:2768
                                      • C:\Windows\SysWOW64\WScript.exe
                                        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                        18⤵
                                        • Loads dropped DLL
                                        PID:2788
                                        • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                          "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                          19⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetWindowsHookEx
                                          PID:1148

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Config.ini

      Filesize

      92B

      MD5

      67b9b3e2ded7086f393ebbc36c5e7bca

      SHA1

      e6299d0450b9a92a18cc23b5704a2b475652c790

      SHA256

      44063c266686263f14cd2a83fee124fb3e61a9171a6aab69709464f49511011d

      SHA512

      826fbc9481f46b1ae3db828a665c55c349023caf563e6e8c17321f5f3af3e4c3914955db6f0eebfc6defe561315435d47310b4d0499ab9c2c85bb61264dedc09

    • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

      Filesize

      753B

      MD5

      334cfaa74f8948552fd215a18d5a341d

      SHA1

      77260d6e28d1ab10cc7c288e83f01f44b9629abb

      SHA256

      daab91e1e4bb06d910a0102fd855427b23a8dd728672a1b1e2261ccb7b87969c

      SHA512

      44b02fd77c94c0ab40fc2ca3e68f5120d7f416f180c50fd52fd63d2674636d9e9c2d5b1d1d143a4aee836ec52c0097bc76a63f2820c576e4b49a63fc3b90d826

    • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

      Filesize

      696B

      MD5

      4e9605159361f93230fef3cc5ad4301c

      SHA1

      64e6d5673487e049cc4e96650b507641062ca1bf

      SHA256

      2abd0c0ae088f6c911f23add50e985c447f1c62c8a45f848698b08d6e6dd20e7

      SHA512

      5cf02982826cc6e08ea33c4ce5d186ad4277493480cf08c2df56a7deea87e58a6df3a95097c96409a89317528933e0999d4ccddc2403024bd04b6e1c312f42fe

    • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

      Filesize

      696B

      MD5

      951aaea1269f2a203f3dd7cd181c5d34

      SHA1

      3623d216764b24aa0b02cbc136287252bf5b412a

      SHA256

      228b66ed4c4a1270fe5a6655cdd849de937351e95974b96acafa59b8107b7dd4

      SHA512

      cd84967ad43a13c3cd57cc80f6533a9e9fd93a5eddf4807825b8d19883da4acda3e7b4ff963f23209c579050fedf834382d8e718386c852ceaf350b2b0f91816

    • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

      Filesize

      696B

      MD5

      3ed43de1cee96aaf1d64189d4482a672

      SHA1

      a346f6b3eca7b8442021d9878288d91084d00d79

      SHA256

      b2905e040a668759a3fbdc7f07ff57b3e197bbeec24099b65734e884c1e0bd98

      SHA512

      8f8536a36603c14a567034f0119212a6b3bf9dd52afcbe213b4e26c737394fe838baf0743440f62cd5d61d8d9c694279679e155920a9af3c2cac1549d43040dc

    • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

      Filesize

      696B

      MD5

      f68761d0622df41d256ee6fc39583d8a

      SHA1

      2dd40e574a86ff4b4be5e6aca6fda4d7fcc33d56

      SHA256

      b4bf1092c76497e935596e32fcb9119a44acab11e9b80b660ecea53867655245

      SHA512

      fd70e0b445bcd24117b449853c98a4996063d49f774a55bc5aca087b44cdb5381974551c4fcd2d3d1c82cd708fcb616009519f3914267ea5c37cdda4d31ea3a1

    • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

      Filesize

      696B

      MD5

      2caa2e102cde23b48c1d5a47d901c3ff

      SHA1

      715fcb390ad3d9016885ab48ea99b2e204d1989b

      SHA256

      8e1f14065ac316ee2fcefab057390fe8b1ec88d9c35536f0755204ddf0d84ada

      SHA512

      9f6b298b5becff9b0af67c3181177876366db57d8d48ad3974dffa4f61fe7512b68d770e518d08d59c58d2707c52bd78930d2e36f00ef06f0a26d208e5372ae3

    • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

      Filesize

      696B

      MD5

      bb73f45ba0ab8d0e25bc6dcd5900a0f1

      SHA1

      18dd20b311cabf033725cb71f00e22449f559963

      SHA256

      c5b311f8ce95c93ed51768b74c6765874352e5fc61641ab54034281a5206c3b5

      SHA512

      f2adbb4978b02ce150fc2f4a8f6d7734ca465351c502e5a425a9dc0f751be9a048df54dfff086b4b049a80cdc8127863ea704a3b6e1855f9d4406e5778b82e04

    • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

      Filesize

      696B

      MD5

      ee35194fa07bea6145178b37a18edb25

      SHA1

      7cbe9989cbc0090cc0ab534c7aa77d64d959e489

      SHA256

      e323603a594cf3a7e03aea20d2ab69a17040a02f256ac1e3fe02f8a36889a483

      SHA512

      d292e22575da17d694a33d6132cea65ca1c58a16bd2532dd24db161d2a77cf233039ed1b66b48868210f4d0ffff16678db3be341eca044432b8087b520e59f71

    • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

      Filesize

      696B

      MD5

      1ddf68547078713a6bd04e589e87bc2f

      SHA1

      cdfb5481f8214590744133c77204eff54e733b90

      SHA256

      a5954677872e02157f5c6921ef883fbc22a4f7940d17403a9a0658931d4971fc

      SHA512

      194d12570a7d4e8e9341f56d23fda7ff49e131e818b93633b75c6ef05b6972b8428294bb95529af25cf75cbe2d86756dab000be200466a30a64922e764ebfc2d

    • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

      Filesize

      696B

      MD5

      e74576d29f1c1a7185cdf1e12b96a260

      SHA1

      f76ee203cb56b7dda62a2947ff1e2fc954efa777

      SHA256

      e31ecb9dcf31c19fbd131b31e5191375f7aeb708ffa678363de99e118715eb65

      SHA512

      934e3a9171de8fe03c9b398b4e79b3eee77845750ba2b0d16c3a38bc8299d3d72643cedfbb025df848f4c5ab302f5d4b145da13c2ac3ed96bdc1658791d4f5bb

    • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

      Filesize

      1.1MB

      MD5

      d548160ea8580fc63f711d40fae64f51

      SHA1

      842938dee0938c8d9355e252a1702ad30c28eb80

      SHA256

      d76f3844f450fae7f66490109d8be72ce499287e56c388792e961382454cfcf1

      SHA512

      0437d2ca40c521668bb72f55b54dbf84ef3dcc438c7a2a510a85f5b87c541536c4882603cddd05c469a2b98505016503eeb9107ffd870549f593b8e4ee0811f8

    • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

      Filesize

      1.1MB

      MD5

      7db51038cdb3934b0d07850e94a1f354

      SHA1

      77ad19a1b8036cbb8ce4ab059283589d5adf05f8

      SHA256

      86e17fa6aaee63631c3a3f22eb0144b7ca71f6a2d6ea4bd599bc8fe920891a94

      SHA512

      301246393d1465d88bdf9e47dd53447a6a0bb340ad75b9ef05026e586597560f8bd38b6e24fc6cef9ff59803469167011dbb55235ac29037c16a659d871397a7

    • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

      Filesize

      1.1MB

      MD5

      7db78081c6319360149a5aebdc863c41

      SHA1

      5f2e292e73d5eb00de86859105d67d1d7f395b5a

      SHA256

      d6ea4bbeee9456b3f56e41371c4a90afedbf7b7d6b82f3cc41c2fdf83db9ba50

      SHA512

      cf96569ab90b8c201efd898d8da5d5b2325d1e6f5054bc6d281b8fc823ba9f9ec46c3a90ef773df02d43b04353070bf1a72d56d8e421feae64dd72b0703cb583

    • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

      Filesize

      1.1MB

      MD5

      c6906b8dd7e870b47e8934261235e4cb

      SHA1

      06c798326b871d55c1c2a670a3dea6ef5543da85

      SHA256

      5b70eca52b703caeef141294290b7f710eecc2199c246635e701ae49e9da924f

      SHA512

      c91496b0a3e1280f0013cf6e7468074ac03ba1db04b3def9422af1fa613d009f2086b806ec71bc517bcac3656fc6ad9a28fb7e8793c671a6297176b1351285aa

    • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

      Filesize

      1.1MB

      MD5

      e2882f6bbddd6097caa96fb5d93e224c

      SHA1

      74a276c98d7cc9f36d2649d580d30f6ac0f400c5

      SHA256

      23259a5bcc6a7f222677e30b4ce74d72d9f6159b3363131ab7d944dc00e87cd3

      SHA512

      c80c4881fc5e248d893a8005d39a10dbe419cf4a32a16044b0a32eeb00028ecf46a40828fa741f041527f6fe46fd4d1161bf779673103ef7b267ac6ef0a6a354

    • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

      Filesize

      1.1MB

      MD5

      7fc0458e12516f2ebc9ae4a28898dbbe

      SHA1

      fcdcb9cbe4ea5dd8f177a555c463b312575c0333

      SHA256

      39debba6471ee44bd3d9b6d82dff2c9755b578f24e0b0a2282ea334b1fc3335e

      SHA512

      887b80fe5b5e8adc125be79d0d29272382da5c7300ab9f07625dab9533e552b1317dfbe32958085281555b0860d3ff8a8241560c6eafaac09100c94fc2570df0

    • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

      Filesize

      1.1MB

      MD5

      981d3268f82c374507c4bccd244f8594

      SHA1

      1f36f09f31e43d3b1f9dcd3393b0c76bca802297

      SHA256

      65134787eae8c02fa0294da6a400964fc9dcdc5d5a8a74817b79bcb68eb84eeb

      SHA512

      46ddf349e1e7809c8abfa1ce1940d6ebc0c76014bc56c3f44192b87c96a11db2332f13b35a13d493f5e6c95a667d6be89e58e852aa4af20011da3debea1d1aff

    • memory/576-118-0x0000000000400000-0x000000000055F000-memory.dmp

      Filesize

      1.4MB

    • memory/576-126-0x0000000000400000-0x000000000055F000-memory.dmp

      Filesize

      1.4MB

    • memory/684-102-0x0000000005E00000-0x0000000005F5F000-memory.dmp

      Filesize

      1.4MB

    • memory/684-103-0x0000000005E00000-0x0000000005F5F000-memory.dmp

      Filesize

      1.4MB

    • memory/1148-149-0x0000000000400000-0x000000000055F000-memory.dmp

      Filesize

      1.4MB

    • memory/1148-152-0x0000000000400000-0x000000000055F000-memory.dmp

      Filesize

      1.4MB

    • memory/1652-88-0x0000000004650000-0x00000000047AF000-memory.dmp

      Filesize

      1.4MB

    • memory/1652-89-0x0000000004650000-0x00000000047AF000-memory.dmp

      Filesize

      1.4MB

    • memory/1696-73-0x00000000044F0000-0x000000000464F000-memory.dmp

      Filesize

      1.4MB

    • memory/1696-72-0x00000000044F0000-0x000000000464F000-memory.dmp

      Filesize

      1.4MB

    • memory/1788-74-0x0000000000400000-0x000000000055F000-memory.dmp

      Filesize

      1.4MB

    • memory/1788-82-0x0000000000400000-0x000000000055F000-memory.dmp

      Filesize

      1.4MB

    • memory/2016-57-0x0000000004550000-0x00000000046AF000-memory.dmp

      Filesize

      1.4MB

    • memory/2052-38-0x0000000000400000-0x000000000055F000-memory.dmp

      Filesize

      1.4MB

    • memory/2052-29-0x0000000000400000-0x000000000055F000-memory.dmp

      Filesize

      1.4MB

    • memory/2228-58-0x0000000000400000-0x000000000055F000-memory.dmp

      Filesize

      1.4MB

    • memory/2228-67-0x0000000000400000-0x000000000055F000-memory.dmp

      Filesize

      1.4MB

    • memory/2748-10-0x0000000000400000-0x000000000055F000-memory.dmp

      Filesize

      1.4MB

    • memory/2748-117-0x0000000005C80000-0x0000000005DDF000-memory.dmp

      Filesize

      1.4MB

    • memory/2748-0-0x0000000000400000-0x000000000055F000-memory.dmp

      Filesize

      1.4MB

    • memory/2748-129-0x0000000004730000-0x000000000488F000-memory.dmp

      Filesize

      1.4MB

    • memory/2768-138-0x0000000000400000-0x000000000055F000-memory.dmp

      Filesize

      1.4MB

    • memory/2768-130-0x0000000000400000-0x000000000055F000-memory.dmp

      Filesize

      1.4MB

    • memory/2788-146-0x0000000005DC0000-0x0000000005F1F000-memory.dmp

      Filesize

      1.4MB

    • memory/2788-147-0x0000000005DC0000-0x0000000005F1F000-memory.dmp

      Filesize

      1.4MB

    • memory/2796-52-0x0000000000400000-0x000000000055F000-memory.dmp

      Filesize

      1.4MB

    • memory/2796-43-0x0000000000400000-0x000000000055F000-memory.dmp

      Filesize

      1.4MB

    • memory/2828-114-0x0000000000400000-0x000000000055F000-memory.dmp

      Filesize

      1.4MB

    • memory/2828-106-0x0000000000400000-0x000000000055F000-memory.dmp

      Filesize

      1.4MB

    • memory/2840-14-0x0000000005BA0000-0x0000000005CFF000-memory.dmp

      Filesize

      1.4MB

    • memory/2840-15-0x0000000005BA0000-0x0000000005CFF000-memory.dmp

      Filesize

      1.4MB

    • memory/2924-150-0x0000000000400000-0x000000000055F000-memory.dmp

      Filesize

      1.4MB

    • memory/2924-151-0x0000000000400000-0x000000000055F000-memory.dmp

      Filesize

      1.4MB

    • memory/3040-97-0x0000000000400000-0x000000000055F000-memory.dmp

      Filesize

      1.4MB

    • memory/3068-25-0x0000000000400000-0x000000000055F000-memory.dmp

      Filesize

      1.4MB