Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19-07-2024 02:07
Static task
static1
Behavioral task
behavioral1
Sample
3ccb4c53ebcc6db5b38ff12d401f84b0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3ccb4c53ebcc6db5b38ff12d401f84b0N.exe
Resource
win10v2004-20240709-en
General
-
Target
3ccb4c53ebcc6db5b38ff12d401f84b0N.exe
-
Size
78KB
-
MD5
3ccb4c53ebcc6db5b38ff12d401f84b0
-
SHA1
098f9412b85ea0c6f6391414a36de41ecc2ae4ca
-
SHA256
b4a8c8b2a1e0fc7f526d176b18b4f24b9b72a430d7b337f0943bd06afc12710e
-
SHA512
a2a076c3ad0f77d93f053eae5f9df2e0863faa95be41e2f0f3d172221fae5051f6dba4402120ee5d0d5aef50bf102253473de06bc0bf21f15dcee741554e04f4
-
SSDEEP
1536:XzHY6uaJtZAlGmWw644txVILJtcfJuovFdPKmNqOqD70Gou2P2oYe9QtLR9/ga1P:DHYI3ZAtWDDILJLovbicqOq3o+nLR9/J
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
3ccb4c53ebcc6db5b38ff12d401f84b0N.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation 3ccb4c53ebcc6db5b38ff12d401f84b0N.exe -
Executes dropped EXE 1 IoCs
Processes:
tmpA98E.tmp.exepid process 2172 tmpA98E.tmp.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
tmpA98E.tmp.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\caspol.exe = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\InstallMembership.exe\"" tmpA98E.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
3ccb4c53ebcc6db5b38ff12d401f84b0N.exetmpA98E.tmp.exedescription pid process Token: SeDebugPrivilege 1500 3ccb4c53ebcc6db5b38ff12d401f84b0N.exe Token: SeDebugPrivilege 2172 tmpA98E.tmp.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
3ccb4c53ebcc6db5b38ff12d401f84b0N.exevbc.exedescription pid process target process PID 1500 wrote to memory of 3236 1500 3ccb4c53ebcc6db5b38ff12d401f84b0N.exe vbc.exe PID 1500 wrote to memory of 3236 1500 3ccb4c53ebcc6db5b38ff12d401f84b0N.exe vbc.exe PID 1500 wrote to memory of 3236 1500 3ccb4c53ebcc6db5b38ff12d401f84b0N.exe vbc.exe PID 3236 wrote to memory of 2536 3236 vbc.exe cvtres.exe PID 3236 wrote to memory of 2536 3236 vbc.exe cvtres.exe PID 3236 wrote to memory of 2536 3236 vbc.exe cvtres.exe PID 1500 wrote to memory of 2172 1500 3ccb4c53ebcc6db5b38ff12d401f84b0N.exe tmpA98E.tmp.exe PID 1500 wrote to memory of 2172 1500 3ccb4c53ebcc6db5b38ff12d401f84b0N.exe tmpA98E.tmp.exe PID 1500 wrote to memory of 2172 1500 3ccb4c53ebcc6db5b38ff12d401f84b0N.exe tmpA98E.tmp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ccb4c53ebcc6db5b38ff12d401f84b0N.exe"C:\Users\Admin\AppData\Local\Temp\3ccb4c53ebcc6db5b38ff12d401f84b0N.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\xd-cunhx.cmdline"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESAA78.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc445A78E14CAF49D6B7EB65EBBDC0AFBB.TMP"3⤵
-
C:\Users\Admin\AppData\Local\Temp\tmpA98E.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpA98E.tmp.exe" C:\Users\Admin\AppData\Local\Temp\3ccb4c53ebcc6db5b38ff12d401f84b0N.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\RESAA78.tmpFilesize
1KB
MD5cd02a4e9754ab6fd9fc1b7acbc017475
SHA1f4a1f4227d357a6f8372a1d27d1586c880460aa3
SHA256c40a709ee697181a3f2141f978eebecd8ec5cc3e6bf52050a2e3c610a1e0bbd3
SHA5129f54124fef81b3d90b21d719eb5724a2612f6a10356b1cade659809f626fee7bcd1b62a24a21a811906d9be46ba9d5bf9747768411a7ad355a9bb22e4931b873
-
C:\Users\Admin\AppData\Local\Temp\tmpA98E.tmp.exeFilesize
78KB
MD591532500589d91fb2efa0dd8c9b575e3
SHA12f9dcb2abd1be8277952e8081d9be1bcdc2c6c09
SHA256cd7232b2077eb4a2e473fe41562988b3f0216fe249bdd8fea4711fd88f5854ae
SHA512861d477820aa00aa01fb1777f29ced1c1d57a9814283b08bb645f8c777c6640b40c542806b91043040900097a3a09cfb21f4201b9a8ce6b2561fa48eef807bd8
-
C:\Users\Admin\AppData\Local\Temp\vbc445A78E14CAF49D6B7EB65EBBDC0AFBB.TMPFilesize
660B
MD50d361ee7a5a6d722b546ce9ce3ea036f
SHA1ed6afdd5ba1bb4859991caa69a058b16285660e2
SHA2566c3efb0f0d058801ce1bfa76b71bbd4f15e964addf747a924da1c8792562b0fb
SHA512db881c656840f9323f72f556c7589814f2fb3adcc4df43039feb3465a30a1a526ce12b68863c5883c04bcac3d5173849d3eef63068d36fb2b4d781948e7d26bc
-
C:\Users\Admin\AppData\Local\Temp\xd-cunhx.0.vbFilesize
15KB
MD5b27173e12b1f2b81c61a6f9c5f2de3fe
SHA1e579b9bd9f57f312ee3bcda47329d0bf0c55f289
SHA256d5ddeafb91971f440b76d24c407fc7cdc34df084a76335a2522484ba95e755a4
SHA512e0a21c6608a3baf0a4dc02fc2d4e2af41efcd634912e696f14cc6340c8140551739e73083cf0625c32cba3ba8be4ba3a682062a3e657a4540b18245569b0154b
-
C:\Users\Admin\AppData\Local\Temp\xd-cunhx.cmdlineFilesize
266B
MD5e04c6334cf8af9a5b33eeb93e83de5c9
SHA1a003ddca79c39ea3a85bea37a0b2a0e7e4e8f698
SHA256439ab0b01c3d58d20053d8453920e2f540d076889e4abd56819abf38404ad180
SHA51232ca69ead09b76c3d24db4a2dd4a69ccd65643214b78f974b2bd9fbd85c55f0aee71a7f7b08ba68680f61428d30501a4f0e30716836a5e884deed8d4a1a81be6
-
C:\Users\Admin\AppData\Local\Temp\zCom.resourcesFilesize
62KB
MD5a26b0f78faa3881bb6307a944b096e91
SHA142b01830723bf07d14f3086fa83c4f74f5649368
SHA256b43ecda931e7af03f0768c905ed9fa82c03e41e566b1dff9960afc6b91ae5ab5
SHA512a0e9c2814fca6bcf87e779592c005d7a8eef058a61f5a5443f7cf8d97e2316d0cde91ed51270bbcc23ccf68c7fc4a321a5a95a4eed75cb8d8a45cb3aa725fb9c
-
memory/1500-1-0x0000000075420000-0x00000000759D1000-memory.dmpFilesize
5.7MB
-
memory/1500-2-0x0000000075420000-0x00000000759D1000-memory.dmpFilesize
5.7MB
-
memory/1500-0-0x0000000075422000-0x0000000075423000-memory.dmpFilesize
4KB
-
memory/1500-22-0x0000000075420000-0x00000000759D1000-memory.dmpFilesize
5.7MB
-
memory/2172-24-0x0000000075420000-0x00000000759D1000-memory.dmpFilesize
5.7MB
-
memory/2172-23-0x0000000075420000-0x00000000759D1000-memory.dmpFilesize
5.7MB
-
memory/2172-25-0x0000000075420000-0x00000000759D1000-memory.dmpFilesize
5.7MB
-
memory/2172-26-0x0000000075420000-0x00000000759D1000-memory.dmpFilesize
5.7MB
-
memory/2172-27-0x0000000075420000-0x00000000759D1000-memory.dmpFilesize
5.7MB
-
memory/2172-28-0x0000000075420000-0x00000000759D1000-memory.dmpFilesize
5.7MB
-
memory/3236-9-0x0000000075420000-0x00000000759D1000-memory.dmpFilesize
5.7MB
-
memory/3236-18-0x0000000075420000-0x00000000759D1000-memory.dmpFilesize
5.7MB