Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26-07-2024 12:44
Static task
static1
Behavioral task
behavioral1
Sample
0cd87830a30b703bdeba484aa1303bc0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0cd87830a30b703bdeba484aa1303bc0N.exe
Resource
win10v2004-20240709-en
General
-
Target
0cd87830a30b703bdeba484aa1303bc0N.exe
-
Size
78KB
-
MD5
0cd87830a30b703bdeba484aa1303bc0
-
SHA1
3ce059f09cc9478f1dca1a00b01d121c05ccbb03
-
SHA256
93a8a14bbf42e8a7bee6ab857932894988996d25a3e491b6ef4323914b1e3d9e
-
SHA512
d152dacf25c9e1a6f92c06f6a108393fdb4d4b164eca9c62a5843143b9ffade5b658fb33e51093ccbfbe481b8b57976a6f7a3b9e148be626893dd600d5dccaf8
-
SSDEEP
1536:H/V58xAlGmWw644txVILJtcfJuovFdPKmNqOqD70Gou2P2oYe9QtP6W9/p1K6:fV58xAtWDDILJLovbicqOq3o+nr9/p
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
0cd87830a30b703bdeba484aa1303bc0N.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 0cd87830a30b703bdeba484aa1303bc0N.exe -
Executes dropped EXE 1 IoCs
Processes:
tmp7649.tmp.exepid process 5084 tmp7649.tmp.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
tmp7649.tmp.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\caspol.exe = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\InstallMembership.exe\"" tmp7649.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
0cd87830a30b703bdeba484aa1303bc0N.exevbc.execvtres.exetmp7649.tmp.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0cd87830a30b703bdeba484aa1303bc0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp7649.tmp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
0cd87830a30b703bdeba484aa1303bc0N.exetmp7649.tmp.exedescription pid process Token: SeDebugPrivilege 1432 0cd87830a30b703bdeba484aa1303bc0N.exe Token: SeDebugPrivilege 5084 tmp7649.tmp.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
0cd87830a30b703bdeba484aa1303bc0N.exevbc.exedescription pid process target process PID 1432 wrote to memory of 4720 1432 0cd87830a30b703bdeba484aa1303bc0N.exe vbc.exe PID 1432 wrote to memory of 4720 1432 0cd87830a30b703bdeba484aa1303bc0N.exe vbc.exe PID 1432 wrote to memory of 4720 1432 0cd87830a30b703bdeba484aa1303bc0N.exe vbc.exe PID 4720 wrote to memory of 4484 4720 vbc.exe cvtres.exe PID 4720 wrote to memory of 4484 4720 vbc.exe cvtres.exe PID 4720 wrote to memory of 4484 4720 vbc.exe cvtres.exe PID 1432 wrote to memory of 5084 1432 0cd87830a30b703bdeba484aa1303bc0N.exe tmp7649.tmp.exe PID 1432 wrote to memory of 5084 1432 0cd87830a30b703bdeba484aa1303bc0N.exe tmp7649.tmp.exe PID 1432 wrote to memory of 5084 1432 0cd87830a30b703bdeba484aa1303bc0N.exe tmp7649.tmp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0cd87830a30b703bdeba484aa1303bc0N.exe"C:\Users\Admin\AppData\Local\Temp\0cd87830a30b703bdeba484aa1303bc0N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\-vqkvimm.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES782D.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc4524653661F14D46A799F9E817DD2C5.TMP"3⤵
- System Location Discovery: System Language Discovery
-
C:\Users\Admin\AppData\Local\Temp\tmp7649.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp7649.tmp.exe" C:\Users\Admin\AppData\Local\Temp\0cd87830a30b703bdeba484aa1303bc0N.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\-vqkvimm.0.vbFilesize
14KB
MD585e6fda5aae3d9a8c252130c857b52f7
SHA1eba8e960bcbea9d6ceded1f13a5c96bf47fb2966
SHA256e111df07556062b0f24c5a6ad8a450efb83214799bd7492a194420a0c6cd40b9
SHA512c4d7938d7c8e96aba73eb17d8d2df453c00eb126129927144add89c579ae931e7f638e4fd4ce318747333b8e16ef9c942f92728fef0e22c3fa4e170717ad8124
-
C:\Users\Admin\AppData\Local\Temp\-vqkvimm.cmdlineFilesize
266B
MD54b3a2f46d63a7c81ebc3afbc6f6a0f4a
SHA1c7d13519c0707efcec4faec921aca325743217ff
SHA2568b94b8339bfb6ed61c2e8228eac8f983317e644db6717827cef8971596c52bd5
SHA51293234de73a6c926e6dd1b6886fe218c1b41aa6de0e38e25ec60689117178290a507bbf06491b9d908fea03b94526237f698a8342baa46c4c019a226b362b38c3
-
C:\Users\Admin\AppData\Local\Temp\RES782D.tmpFilesize
1KB
MD5677ac2e078dbc0a0d5e46b2ae3fe4be2
SHA1597c97c2fd2b76f6b09889c6f718f842174fcbcc
SHA25634edc1e4f0bfe7479fe61470a8e32f2d8bac724c62220063bed4906dc850ba11
SHA5120e6fc1bba58f686af7878e41e4aefd6294fc0f707de5e244c0230c7e7a5535a36a720b6251a767d36d4e2597ce91371c98bf82cc9688665e681ad207865aff27
-
C:\Users\Admin\AppData\Local\Temp\tmp7649.tmp.exeFilesize
78KB
MD5a4e7f57b23beef1431e4218186b6f5c1
SHA1b978b67cc769bb52a18b7e4539332320cccd1989
SHA25604b85c1f58e8e4a61a499c9d0939464a320fd77f6cba98df5bd3fb7002c98377
SHA51211bd760461e0dd53b03956a903a375438b06a3a506f41f7a1f66c39defae795f2ddb7510f58ac4d90e2f4e6e4a9556bf730823c51a1bf35a02f762e60d6da8a0
-
C:\Users\Admin\AppData\Local\Temp\vbc4524653661F14D46A799F9E817DD2C5.TMPFilesize
660B
MD5505bb13f003b9830245165c4cb66ba58
SHA15995e5280453389e98cbaa4a543c1f47f413aa6e
SHA2563e2c02f6af77e5d8b52c04ef4ac8a40fdf4934aa3ea8714b0379c571b930cf2b
SHA51202f6dfda1b7729451382787160888962638a1dc12fa2e879ceaea448d7708c4e73ee78c7cff837870c3cecadfc2bd28d957129e7ee2905c98ed98a9729a59286
-
C:\Users\Admin\AppData\Local\Temp\zCom.resourcesFilesize
62KB
MD5a26b0f78faa3881bb6307a944b096e91
SHA142b01830723bf07d14f3086fa83c4f74f5649368
SHA256b43ecda931e7af03f0768c905ed9fa82c03e41e566b1dff9960afc6b91ae5ab5
SHA512a0e9c2814fca6bcf87e779592c005d7a8eef058a61f5a5443f7cf8d97e2316d0cde91ed51270bbcc23ccf68c7fc4a321a5a95a4eed75cb8d8a45cb3aa725fb9c
-
memory/1432-1-0x0000000074680000-0x0000000074C31000-memory.dmpFilesize
5.7MB
-
memory/1432-22-0x0000000074680000-0x0000000074C31000-memory.dmpFilesize
5.7MB
-
memory/1432-0-0x0000000074682000-0x0000000074683000-memory.dmpFilesize
4KB
-
memory/1432-2-0x0000000074680000-0x0000000074C31000-memory.dmpFilesize
5.7MB
-
memory/4720-18-0x0000000074680000-0x0000000074C31000-memory.dmpFilesize
5.7MB
-
memory/4720-9-0x0000000074680000-0x0000000074C31000-memory.dmpFilesize
5.7MB
-
memory/5084-23-0x0000000074680000-0x0000000074C31000-memory.dmpFilesize
5.7MB
-
memory/5084-24-0x0000000074680000-0x0000000074C31000-memory.dmpFilesize
5.7MB
-
memory/5084-25-0x0000000074680000-0x0000000074C31000-memory.dmpFilesize
5.7MB
-
memory/5084-26-0x0000000074680000-0x0000000074C31000-memory.dmpFilesize
5.7MB
-
memory/5084-27-0x0000000074680000-0x0000000074C31000-memory.dmpFilesize
5.7MB
-
memory/5084-28-0x0000000074680000-0x0000000074C31000-memory.dmpFilesize
5.7MB