Analysis

  • max time kernel
    90s
  • max time network
    116s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/07/2024, 11:50

General

  • Target

    b14368a184a60a4acb5a06a6b8d8e7c0N.exe

  • Size

    1.3MB

  • MD5

    b14368a184a60a4acb5a06a6b8d8e7c0

  • SHA1

    b01723f549c9958f897daa63787a053ebe063b14

  • SHA256

    eb1048c44e92bd6b5da62643bb93eafb7b9012025c2ecd40fbf4cc42dbfeecf6

  • SHA512

    8b90b3579272767fbace23c7ecdcc7b88dada7a31055b6f482eb63eec50bf8bd251ae289f44c10eb04329ea6672743663f520d33283af4401f732119ed62cf5d

  • SSDEEP

    24576:IArW/8hh0FQAq7c8nA7YMv3+DpBNPRI9ovlG4XozaEhptdF/fCGzeYVxXNVD8pVp:Ie0mfW3YNPRRlG4saIprdNy

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b14368a184a60a4acb5a06a6b8d8e7c0N.exe
    "C:\Users\Admin\AppData\Local\Temp\b14368a184a60a4acb5a06a6b8d8e7c0N.exe"
    1⤵
    • Checks computer location settings
    • Drops startup file
    • Adds Run key to start application
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3972
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
      2⤵
        PID:4852
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
        2⤵
          PID:2300

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\Microsoft\Config.ini

        Filesize

        92B

        MD5

        2004bcee923b0e0222f4cab87c2c2a3d

        SHA1

        0a3c122b7cfe403403d913ecc1b328480b1bfc2a

        SHA256

        f92f08df2b65e2f5b5db141c99b098c8b077c0c853a1fd51bfcc6d40dc68ad77

        SHA512

        cae47a4dfdb942622ebca65d57e9d80c29cb299aa8c217983e34a51655c2e96ed26c7fa2fad978b6279ed4d3c8c0571e417c60152bf66a116f67d0fe38d6a445

      • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

        Filesize

        722B

        MD5

        28047a09b5b8502d95e87151dc9cacbc

        SHA1

        bfcf468485e9bcf9e7add0e601f4d4e5af1ded60

        SHA256

        19a12ffd2157d1b5261d2b8d18c93c60a2eddb14742827a5db7494c24ab95e6b

        SHA512

        ade323d4584d64a2f07c14fe27a208039040cb829d6278650b3e77210ea7802eede775b17b134f324f767408c39daf8336faa851557b57bb246140ab5d05c9e3

      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

        Filesize

        1.3MB

        MD5

        6a9530d39a8a0bfb3d759933b3b6fa57

        SHA1

        52db8acd2aa434f7dbef28d7d9c4fa6cfd4dd455

        SHA256

        384cf60783287077a49877b8d64a530f05d4a0b52c6613f031ceb27515012871

        SHA512

        acf2fbe0ae2d30e8a6af5c4a536748243d36b60115dc5e0ddfc76ab1c21d9be48c262f86f3b36f9ab9880dd604f5a9f5d9ede6d181bdd6a62e3c98867930b19a

      • memory/3972-0-0x0000000000400000-0x0000000000554000-memory.dmp

        Filesize

        1.3MB

      • memory/3972-16-0x0000000000400000-0x0000000000554000-memory.dmp

        Filesize

        1.3MB

      • memory/3972-19-0x0000000000400000-0x0000000000554000-memory.dmp

        Filesize

        1.3MB

      • memory/3972-22-0x0000000000400000-0x0000000000554000-memory.dmp

        Filesize

        1.3MB

      • memory/3972-26-0x0000000000400000-0x0000000000554000-memory.dmp

        Filesize

        1.3MB

      • memory/3972-29-0x0000000000400000-0x0000000000554000-memory.dmp

        Filesize

        1.3MB

      • memory/3972-32-0x0000000000400000-0x0000000000554000-memory.dmp

        Filesize

        1.3MB