Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23-07-2024 23:14
Static task
static1
Behavioral task
behavioral1
Sample
7937748848a04534077dd7c699fa865d1873fb71425b49c3f50b581d1e62b2c3.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
7937748848a04534077dd7c699fa865d1873fb71425b49c3f50b581d1e62b2c3.exe
Resource
win10v2004-20240709-en
General
-
Target
7937748848a04534077dd7c699fa865d1873fb71425b49c3f50b581d1e62b2c3.exe
-
Size
78KB
-
MD5
92147390866e992d61c2e53fa1dbf232
-
SHA1
98aaa505c71acb3ff181ff0e12614d5d9cf9847b
-
SHA256
7937748848a04534077dd7c699fa865d1873fb71425b49c3f50b581d1e62b2c3
-
SHA512
125ac3c5aedeb846589e3fdd37a7bebe55a846da5cf3c3d8f6033c752e7d037a343a1260885f54e720c18192a689a709ae8146496f01c91c19bec6f68d5f19c1
-
SSDEEP
1536:uWV58gdy0MochZDsC8Kl/99Z242UdIAkn3jKZPjoYaoQtC6P9/J1ol:uWV58vn7N041Qqhg39/M
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
7937748848a04534077dd7c699fa865d1873fb71425b49c3f50b581d1e62b2c3.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation 7937748848a04534077dd7c699fa865d1873fb71425b49c3f50b581d1e62b2c3.exe -
Deletes itself 1 IoCs
Processes:
tmp5A84.tmp.exepid process 4728 tmp5A84.tmp.exe -
Executes dropped EXE 1 IoCs
Processes:
tmp5A84.tmp.exepid process 4728 tmp5A84.tmp.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
tmp5A84.tmp.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System.XML = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\AppLaunch.exe\"" tmp5A84.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
7937748848a04534077dd7c699fa865d1873fb71425b49c3f50b581d1e62b2c3.exevbc.execvtres.exetmp5A84.tmp.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7937748848a04534077dd7c699fa865d1873fb71425b49c3f50b581d1e62b2c3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp5A84.tmp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
7937748848a04534077dd7c699fa865d1873fb71425b49c3f50b581d1e62b2c3.exetmp5A84.tmp.exedescription pid process Token: SeDebugPrivilege 3988 7937748848a04534077dd7c699fa865d1873fb71425b49c3f50b581d1e62b2c3.exe Token: SeDebugPrivilege 4728 tmp5A84.tmp.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
7937748848a04534077dd7c699fa865d1873fb71425b49c3f50b581d1e62b2c3.exevbc.exedescription pid process target process PID 3988 wrote to memory of 376 3988 7937748848a04534077dd7c699fa865d1873fb71425b49c3f50b581d1e62b2c3.exe vbc.exe PID 3988 wrote to memory of 376 3988 7937748848a04534077dd7c699fa865d1873fb71425b49c3f50b581d1e62b2c3.exe vbc.exe PID 3988 wrote to memory of 376 3988 7937748848a04534077dd7c699fa865d1873fb71425b49c3f50b581d1e62b2c3.exe vbc.exe PID 376 wrote to memory of 1564 376 vbc.exe cvtres.exe PID 376 wrote to memory of 1564 376 vbc.exe cvtres.exe PID 376 wrote to memory of 1564 376 vbc.exe cvtres.exe PID 3988 wrote to memory of 4728 3988 7937748848a04534077dd7c699fa865d1873fb71425b49c3f50b581d1e62b2c3.exe tmp5A84.tmp.exe PID 3988 wrote to memory of 4728 3988 7937748848a04534077dd7c699fa865d1873fb71425b49c3f50b581d1e62b2c3.exe tmp5A84.tmp.exe PID 3988 wrote to memory of 4728 3988 7937748848a04534077dd7c699fa865d1873fb71425b49c3f50b581d1e62b2c3.exe tmp5A84.tmp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7937748848a04534077dd7c699fa865d1873fb71425b49c3f50b581d1e62b2c3.exe"C:\Users\Admin\AppData\Local\Temp\7937748848a04534077dd7c699fa865d1873fb71425b49c3f50b581d1e62b2c3.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\of-75pfl.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES5B8D.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc32C905F9B81E4E68A3303B2A267EFE7A.TMP"3⤵
- System Location Discovery: System Language Discovery
-
C:\Users\Admin\AppData\Local\Temp\tmp5A84.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp5A84.tmp.exe" C:\Users\Admin\AppData\Local\Temp\7937748848a04534077dd7c699fa865d1873fb71425b49c3f50b581d1e62b2c3.exe2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\RES5B8D.tmpFilesize
1KB
MD55e349ee72b8e2bff1cb1353d2e5fffd7
SHA1ada3a92b36290e1966312ac49f202da416639a8b
SHA2564e8eca45d64aaa533b7aaea43d4c8dfdb44322a0023970866247ec96b8dd459c
SHA512ba6549e10b514d5e99189ba379e93303b90fed9de65f657f8117ff04b8023ea503bfc8101eb96ca50b0b45617b0a70bb41d6753309322a5b948d37224ea493cc
-
C:\Users\Admin\AppData\Local\Temp\of-75pfl.0.vbFilesize
14KB
MD5b0b53eb89254d18e1679d53e3035f764
SHA141c531986e0eba09c6f2a8aa194926aeb17db4cb
SHA2560be85d9313ed85f492a588f932fbd81e3d7246f81757911f5a06863de1c43b95
SHA512e2599802ac8329f803289ff46e11cfb61aad90196b2dcee24f001bed8cb5c4fd953a59bc11dff943e826a05a301be32b8bbf322475f7c5f5a9f7523a65845d63
-
C:\Users\Admin\AppData\Local\Temp\of-75pfl.cmdlineFilesize
266B
MD5c58fb908e3f5ab9c16e3396959337b4c
SHA1314056405ae869d77b43076dd305010475ecfe52
SHA256d50d206c02c1a8bb68b920019b680a1cd772b542427525aa820b9e0de4555b73
SHA51293b9ee04cc29fa09c632307fbfe4fcece44aad46229b0ea1ad42386506efb6aaf816b8f149d20d3db7a564566c951603f2d38f41ab2c68b1034b4aae01e8656c
-
C:\Users\Admin\AppData\Local\Temp\tmp5A84.tmp.exeFilesize
78KB
MD590aa16d0df9ea6ec9395097d34a936ba
SHA153674d1856c9a98f527e547d6a2a335698b7284e
SHA25631141c17f316cbb3a8cdad55e7b538d93714224d6211c508717c734ccba87e60
SHA512eb048a303ff596cf03270bac2740503a62c5b8a7fe1250163bb24ffc76c999acc321ed84fda25359600df388783bd41904dfca78d873f256ed1aa1695e6152e1
-
C:\Users\Admin\AppData\Local\Temp\vbc32C905F9B81E4E68A3303B2A267EFE7A.TMPFilesize
660B
MD5f006ace099716b21cc1e7957d967c47d
SHA1115863fb7afef6eb7bd4be3196b169323bfb224d
SHA2562f61d508982fc4846334ecd9347204900c9e4042d796ac4e4da9387de99829c8
SHA51214d79fff9d8178887b117086cfaab83713550df430d58f47c29b7b6694558abafff2933e3789528f6fbe6b83ec93d0668dfb481981d370cbbf5c27baf1a25ef2
-
C:\Users\Admin\AppData\Local\Temp\zCom.resourcesFilesize
62KB
MD5aa4bdac8c4e0538ec2bb4b7574c94192
SHA1ef76d834232b67b27ebd75708922adea97aeacce
SHA256d7dbe167a7b64a4d11e76d172c8c880020fe7e4bc9cae977ac06982584a6b430
SHA5120ec342286c9dbe78dd7a371afaf405232ff6242f7e024c6640b265ba2288771297edbb5a6482848daad5007aef503e92508f1a7e1a8b8ff3fe20343b21421a65
-
memory/376-9-0x0000000074B50000-0x0000000075101000-memory.dmpFilesize
5.7MB
-
memory/376-18-0x0000000074B50000-0x0000000075101000-memory.dmpFilesize
5.7MB
-
memory/3988-0-0x0000000074B52000-0x0000000074B53000-memory.dmpFilesize
4KB
-
memory/3988-2-0x0000000074B50000-0x0000000075101000-memory.dmpFilesize
5.7MB
-
memory/3988-1-0x0000000074B50000-0x0000000075101000-memory.dmpFilesize
5.7MB
-
memory/3988-22-0x0000000074B50000-0x0000000075101000-memory.dmpFilesize
5.7MB
-
memory/4728-24-0x0000000074B50000-0x0000000075101000-memory.dmpFilesize
5.7MB
-
memory/4728-23-0x0000000074B50000-0x0000000075101000-memory.dmpFilesize
5.7MB
-
memory/4728-26-0x0000000074B50000-0x0000000075101000-memory.dmpFilesize
5.7MB
-
memory/4728-27-0x0000000074B50000-0x0000000075101000-memory.dmpFilesize
5.7MB
-
memory/4728-28-0x0000000074B50000-0x0000000075101000-memory.dmpFilesize
5.7MB