Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
06/08/2024, 06:51
Static task
static1
Behavioral task
behavioral1
Sample
f0815014dd6e1ec247fc3e26173271990c9115915d1e167c3322433810654b81.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
f0815014dd6e1ec247fc3e26173271990c9115915d1e167c3322433810654b81.exe
Resource
win10v2004-20240802-en
General
-
Target
f0815014dd6e1ec247fc3e26173271990c9115915d1e167c3322433810654b81.exe
-
Size
1.1MB
-
MD5
2a2dc405cb6deaa5305d519f24fa19db
-
SHA1
e6466d2f34ce502f8ec96a674f8f008fc1a52cbb
-
SHA256
f0815014dd6e1ec247fc3e26173271990c9115915d1e167c3322433810654b81
-
SHA512
9c8ab5fd0ed61e30eeee09760b869316a54b92d968a8fbbc95db383d8877f680847717090a1dd06d6a1cffeab362637364929d440564cff50ea73b444d5d4ab7
-
SSDEEP
24576:aH0dl8myX9Bg42QoXFkrzkmplSgRDYo0lG4Z8r7Qfbkiu5Q6:acallSllG4ZM7QzMZ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3024 svchcst.exe -
Executes dropped EXE 8 IoCs
pid Process 3024 svchcst.exe 2168 svchcst.exe 2440 svchcst.exe 2848 svchcst.exe 1568 svchcst.exe 1560 svchcst.exe 1492 svchcst.exe 2084 svchcst.exe -
Loads dropped DLL 10 IoCs
pid Process 752 WScript.exe 752 WScript.exe 2044 WScript.exe 1728 WScript.exe 1728 WScript.exe 376 WScript.exe 376 WScript.exe 1148 WScript.exe 2484 WScript.exe 2484 WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 18 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f0815014dd6e1ec247fc3e26173271990c9115915d1e167c3322433810654b81.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2408 f0815014dd6e1ec247fc3e26173271990c9115915d1e167c3322433810654b81.exe 3024 svchcst.exe 3024 svchcst.exe 3024 svchcst.exe 3024 svchcst.exe 3024 svchcst.exe 3024 svchcst.exe 3024 svchcst.exe 3024 svchcst.exe 3024 svchcst.exe 3024 svchcst.exe 3024 svchcst.exe 3024 svchcst.exe 3024 svchcst.exe 3024 svchcst.exe 3024 svchcst.exe 3024 svchcst.exe 3024 svchcst.exe 3024 svchcst.exe 3024 svchcst.exe 3024 svchcst.exe 3024 svchcst.exe 3024 svchcst.exe 3024 svchcst.exe 3024 svchcst.exe 3024 svchcst.exe 3024 svchcst.exe 3024 svchcst.exe 3024 svchcst.exe 3024 svchcst.exe 3024 svchcst.exe 3024 svchcst.exe 3024 svchcst.exe 3024 svchcst.exe 3024 svchcst.exe 3024 svchcst.exe 3024 svchcst.exe 3024 svchcst.exe 3024 svchcst.exe 3024 svchcst.exe 3024 svchcst.exe 3024 svchcst.exe 3024 svchcst.exe 3024 svchcst.exe 3024 svchcst.exe 3024 svchcst.exe 3024 svchcst.exe 3024 svchcst.exe 3024 svchcst.exe 3024 svchcst.exe 3024 svchcst.exe 3024 svchcst.exe 3024 svchcst.exe 3024 svchcst.exe 3024 svchcst.exe 3024 svchcst.exe 3024 svchcst.exe 3024 svchcst.exe 3024 svchcst.exe 3024 svchcst.exe 3024 svchcst.exe 3024 svchcst.exe 3024 svchcst.exe 3024 svchcst.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2408 f0815014dd6e1ec247fc3e26173271990c9115915d1e167c3322433810654b81.exe -
Suspicious use of SetWindowsHookEx 18 IoCs
pid Process 2408 f0815014dd6e1ec247fc3e26173271990c9115915d1e167c3322433810654b81.exe 2408 f0815014dd6e1ec247fc3e26173271990c9115915d1e167c3322433810654b81.exe 3024 svchcst.exe 3024 svchcst.exe 2168 svchcst.exe 2168 svchcst.exe 2440 svchcst.exe 2440 svchcst.exe 2848 svchcst.exe 2848 svchcst.exe 1568 svchcst.exe 1568 svchcst.exe 1560 svchcst.exe 1560 svchcst.exe 1492 svchcst.exe 1492 svchcst.exe 2084 svchcst.exe 2084 svchcst.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2408 wrote to memory of 752 2408 f0815014dd6e1ec247fc3e26173271990c9115915d1e167c3322433810654b81.exe 31 PID 2408 wrote to memory of 752 2408 f0815014dd6e1ec247fc3e26173271990c9115915d1e167c3322433810654b81.exe 31 PID 2408 wrote to memory of 752 2408 f0815014dd6e1ec247fc3e26173271990c9115915d1e167c3322433810654b81.exe 31 PID 2408 wrote to memory of 752 2408 f0815014dd6e1ec247fc3e26173271990c9115915d1e167c3322433810654b81.exe 31 PID 752 wrote to memory of 3024 752 WScript.exe 33 PID 752 wrote to memory of 3024 752 WScript.exe 33 PID 752 wrote to memory of 3024 752 WScript.exe 33 PID 752 wrote to memory of 3024 752 WScript.exe 33 PID 3024 wrote to memory of 2044 3024 svchcst.exe 34 PID 3024 wrote to memory of 2044 3024 svchcst.exe 34 PID 3024 wrote to memory of 2044 3024 svchcst.exe 34 PID 3024 wrote to memory of 2044 3024 svchcst.exe 34 PID 2044 wrote to memory of 2168 2044 WScript.exe 35 PID 2044 wrote to memory of 2168 2044 WScript.exe 35 PID 2044 wrote to memory of 2168 2044 WScript.exe 35 PID 2044 wrote to memory of 2168 2044 WScript.exe 35 PID 2168 wrote to memory of 1728 2168 svchcst.exe 36 PID 2168 wrote to memory of 1728 2168 svchcst.exe 36 PID 2168 wrote to memory of 1728 2168 svchcst.exe 36 PID 2168 wrote to memory of 1728 2168 svchcst.exe 36 PID 1728 wrote to memory of 2440 1728 WScript.exe 37 PID 1728 wrote to memory of 2440 1728 WScript.exe 37 PID 1728 wrote to memory of 2440 1728 WScript.exe 37 PID 1728 wrote to memory of 2440 1728 WScript.exe 37 PID 2440 wrote to memory of 1764 2440 svchcst.exe 38 PID 2440 wrote to memory of 1764 2440 svchcst.exe 38 PID 2440 wrote to memory of 1764 2440 svchcst.exe 38 PID 2440 wrote to memory of 1764 2440 svchcst.exe 38 PID 1728 wrote to memory of 2848 1728 WScript.exe 39 PID 1728 wrote to memory of 2848 1728 WScript.exe 39 PID 1728 wrote to memory of 2848 1728 WScript.exe 39 PID 1728 wrote to memory of 2848 1728 WScript.exe 39 PID 2848 wrote to memory of 376 2848 svchcst.exe 40 PID 2848 wrote to memory of 376 2848 svchcst.exe 40 PID 2848 wrote to memory of 376 2848 svchcst.exe 40 PID 2848 wrote to memory of 376 2848 svchcst.exe 40 PID 376 wrote to memory of 1568 376 WScript.exe 41 PID 376 wrote to memory of 1568 376 WScript.exe 41 PID 376 wrote to memory of 1568 376 WScript.exe 41 PID 376 wrote to memory of 1568 376 WScript.exe 41 PID 1568 wrote to memory of 1148 1568 svchcst.exe 42 PID 1568 wrote to memory of 1148 1568 svchcst.exe 42 PID 1568 wrote to memory of 1148 1568 svchcst.exe 42 PID 1568 wrote to memory of 1148 1568 svchcst.exe 42 PID 1148 wrote to memory of 1560 1148 WScript.exe 43 PID 1148 wrote to memory of 1560 1148 WScript.exe 43 PID 1148 wrote to memory of 1560 1148 WScript.exe 43 PID 1148 wrote to memory of 1560 1148 WScript.exe 43 PID 1560 wrote to memory of 2484 1560 svchcst.exe 44 PID 1560 wrote to memory of 2484 1560 svchcst.exe 44 PID 1560 wrote to memory of 2484 1560 svchcst.exe 44 PID 1560 wrote to memory of 2484 1560 svchcst.exe 44 PID 2484 wrote to memory of 1492 2484 WScript.exe 45 PID 2484 wrote to memory of 1492 2484 WScript.exe 45 PID 2484 wrote to memory of 1492 2484 WScript.exe 45 PID 2484 wrote to memory of 1492 2484 WScript.exe 45 PID 1492 wrote to memory of 2008 1492 svchcst.exe 46 PID 1492 wrote to memory of 2008 1492 svchcst.exe 46 PID 1492 wrote to memory of 2008 1492 svchcst.exe 46 PID 1492 wrote to memory of 2008 1492 svchcst.exe 46 PID 2484 wrote to memory of 2084 2484 WScript.exe 47 PID 2484 wrote to memory of 2084 2484 WScript.exe 47 PID 2484 wrote to memory of 2084 2484 WScript.exe 47 PID 2484 wrote to memory of 2084 2484 WScript.exe 47
Processes
-
C:\Users\Admin\AppData\Local\Temp\f0815014dd6e1ec247fc3e26173271990c9115915d1e167c3322433810654b81.exe"C:\Users\Admin\AppData\Local\Temp\f0815014dd6e1ec247fc3e26173271990c9115915d1e167c3322433810654b81.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"6⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"8⤵
- System Location Discovery: System Language Discovery
PID:1764
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"8⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:376 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"10⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"11⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"12⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"14⤵
- System Location Discovery: System Language Discovery
PID:2008
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2084 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"14⤵
- System Location Discovery: System Language Discovery
PID:2728
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92B
MD567b9b3e2ded7086f393ebbc36c5e7bca
SHA1e6299d0450b9a92a18cc23b5704a2b475652c790
SHA25644063c266686263f14cd2a83fee124fb3e61a9171a6aab69709464f49511011d
SHA512826fbc9481f46b1ae3db828a665c55c349023caf563e6e8c17321f5f3af3e4c3914955db6f0eebfc6defe561315435d47310b4d0499ab9c2c85bb61264dedc09
-
Filesize
696B
MD51ef0f0b572c2f4293cad723d25d00c42
SHA121070aedce103ee5e41ef411b732699f04623804
SHA25692f0114d24a1bf7f670197c1b6e8cecc445559bbf6b12e1a82538aa9213fe4a3
SHA5120af8482f8df004ae0534ab1d23addd55149209ab50bfb1ecbfc4d9ee49c7cce91b53fd3ed3b155e020286772eaa8396c89b8f67befe3ca5d9804b7871add0c4c
-
Filesize
696B
MD5e0e0a1f6d22e3905753a9c1ed053cbff
SHA152c11b8049f4015d7825fc1fcbd0d5eadb29a6e4
SHA2562eca9ba67f160c00268003e7239f9cfc5da0f10b6a0b3c82538ef2a0874b871d
SHA5123eb98287cc8115cb648626272eaa6cc77cb57fcd614f0e969d3af3977a8e09e0f7f6f3ee6ef9322e096bf0cec546f681a6983030a10e972b538d42e2bd17740c
-
Filesize
753B
MD590a1bffedf9f603229038fc2fbd3e61a
SHA1d76ea00a0cb1de380d33be24ebf8f2c8653c41c5
SHA256b89050f4c2ca95ff5c06d049966357de4b0995448b3f29b75125e991ff1739ac
SHA512d3dc4f213e7729a209fce6c28bd0ef3a27a8cbc57de2617e6712c52f3dd16e2cdd14cf69f0495ffe053fda30afedf13850556919e8821881ea4977e20ae30787
-
Filesize
696B
MD57d2c3f227d42fae4a5b7fbcb491b74e3
SHA1c1271bbd86747cc709b694ba9579a68b5e75a17c
SHA2569353a2f27a61e571c5bc92ccc1046c1059c5fad8e1e2cafe63a9cc73e1169c33
SHA51250330ad733975966b32fbedffb99a25cd13004d685e5788ef11f1f0fedfc62658e3e8f5ed0030fe60ecb02ba95ffa7d440c067a1e164cc3bc02ac5008b6a27d3
-
Filesize
696B
MD5379619305716718fbeeab2f364946c39
SHA1b663cf106c4673549692fa39d25e9e8f4561cd64
SHA256c844bc25686320e65c1b5259a6d0d6d47f61709f46e2c8eb2ad3f9c3b9333d84
SHA512b2c91d0f1cbc9e253bb3bb339acbab0e31eef31188cc00132c423fee2a85c7a91132c9259b99b23a149f6ba1172b8522e2d8350f88dbb735ad8d7a32f71e2ed8
-
Filesize
696B
MD5dabf4e9d32908d961aaffdd1c77d4879
SHA1e41572d98b7452016fb004c843236377364ab1d3
SHA2563488c64a6d2da3c00e50e954c495ac354ee504e54f3ed6dda6a991c5b9d33e19
SHA512911d46aca8005857c86eddbb3cbbc4301ee5e173b2358a717053cf12727c06cc3b2d757ddf513f969dafe61c6b88d03b1478d8c483495f153e30bf64585195aa
-
Filesize
696B
MD52551ae733b39ac9061a9d5ebd2f29d98
SHA108247d27dd5bf959db0b29d3e5b0551dc47c9d02
SHA256c69ee4a632cc1c351d5fa930d42546923a4125e7d9cbccb2ad9f9e3318be2b77
SHA512a1c669cb87194c2b496a7131f7f2920b6c31156f88d6c1140e79f3b83fbca3785cd57fea2d47cb951ed576e69a1240e81746a5bc5444e65fd05fa5234125731c
-
Filesize
696B
MD5a6723d81dd75369a43431bd61814ac74
SHA1c3d950a8d9f5738222594d01dcaae3fcb467d548
SHA256add1a22f571c2dfbfda508d6ad632223ab81690c73a376500e56855afeb1752b
SHA512d7a42037066b1b1d1dffbc792aef400ca374665b012f02de40a6ff118482acd14555edabd6750defb402a6cf4e273a132c1856103202e47aa090119546718727
-
Filesize
1.1MB
MD5d1ac807eec892119588d893eef510890
SHA1a5d8d42df19747ca6ac2e9b07ced2be70725dad3
SHA2566b76803eec401359abde03dbc874faa3dc047e5070b39492b44016b180ed1168
SHA512f68693fee3f94994352b25ad25691cda04141f0ab65f8b113639eade61c455df589acac3b28a4774b5c5466c1b0184fc451dba7409e0dc5c5ef9c3992164508d
-
Filesize
1.1MB
MD59d5e745fe9f3a0e35ca8fbcafbafb501
SHA1b05998b915fbe7177892107ea1f202218edac675
SHA25653c925515cccc79793043c1ecd1811dd2fd31e5f8dd87a81654259852630991b
SHA51263d5731e7079aaf1d4e27f6ebb3d918e90993ea01cc3113a59183d3907e9a63e4b57b9366add5a50288cf78774a4514428b77929ee342a498f31bb693a39f516