Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08-08-2024 20:43
Static task
static1
Behavioral task
behavioral1
Sample
a12f12687d68214acd6a9cc676004f593e2bc23434fdf81a05dc06a0fa2d4957.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a12f12687d68214acd6a9cc676004f593e2bc23434fdf81a05dc06a0fa2d4957.exe
Resource
win10v2004-20240802-en
General
-
Target
a12f12687d68214acd6a9cc676004f593e2bc23434fdf81a05dc06a0fa2d4957.exe
-
Size
1.1MB
-
MD5
3eea0bfd936008540680eff1af2b166b
-
SHA1
9d4487579231b8c44a4db8008861735c8249ffa5
-
SHA256
a12f12687d68214acd6a9cc676004f593e2bc23434fdf81a05dc06a0fa2d4957
-
SHA512
faa638e8787f6af8e15f7f8dbe3c3c8f0b0498c103e0ee4c529f3fc5475316c473197ed4ccbb79f88fac0efd57320a8f78a9c19c12ccec4b2988008769f03425
-
SSDEEP
24576:aH0dl8myX9Bg42QoXFkrzkmplSgRDYo0lG4Z8r7Qfbkiu5Qf:acallSllG4ZM7QzM4
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation a12f12687d68214acd6a9cc676004f593e2bc23434fdf81a05dc06a0fa2d4957.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation WScript.exe -
Deletes itself 1 IoCs
pid Process 2524 svchcst.exe -
Executes dropped EXE 2 IoCs
pid Process 4584 svchcst.exe 2524 svchcst.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a12f12687d68214acd6a9cc676004f593e2bc23434fdf81a05dc06a0fa2d4957.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings a12f12687d68214acd6a9cc676004f593e2bc23434fdf81a05dc06a0fa2d4957.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1916 a12f12687d68214acd6a9cc676004f593e2bc23434fdf81a05dc06a0fa2d4957.exe 1916 a12f12687d68214acd6a9cc676004f593e2bc23434fdf81a05dc06a0fa2d4957.exe 1916 a12f12687d68214acd6a9cc676004f593e2bc23434fdf81a05dc06a0fa2d4957.exe 1916 a12f12687d68214acd6a9cc676004f593e2bc23434fdf81a05dc06a0fa2d4957.exe 2524 svchcst.exe 2524 svchcst.exe 2524 svchcst.exe 2524 svchcst.exe 2524 svchcst.exe 2524 svchcst.exe 2524 svchcst.exe 2524 svchcst.exe 2524 svchcst.exe 2524 svchcst.exe 2524 svchcst.exe 2524 svchcst.exe 2524 svchcst.exe 2524 svchcst.exe 2524 svchcst.exe 2524 svchcst.exe 2524 svchcst.exe 2524 svchcst.exe 2524 svchcst.exe 2524 svchcst.exe 2524 svchcst.exe 2524 svchcst.exe 2524 svchcst.exe 2524 svchcst.exe 2524 svchcst.exe 2524 svchcst.exe 2524 svchcst.exe 2524 svchcst.exe 2524 svchcst.exe 2524 svchcst.exe 2524 svchcst.exe 2524 svchcst.exe 2524 svchcst.exe 2524 svchcst.exe 2524 svchcst.exe 2524 svchcst.exe 2524 svchcst.exe 2524 svchcst.exe 2524 svchcst.exe 2524 svchcst.exe 2524 svchcst.exe 2524 svchcst.exe 2524 svchcst.exe 2524 svchcst.exe 2524 svchcst.exe 2524 svchcst.exe 2524 svchcst.exe 2524 svchcst.exe 2524 svchcst.exe 2524 svchcst.exe 2524 svchcst.exe 2524 svchcst.exe 2524 svchcst.exe 2524 svchcst.exe 2524 svchcst.exe 2524 svchcst.exe 2524 svchcst.exe 2524 svchcst.exe 2524 svchcst.exe 2524 svchcst.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1916 a12f12687d68214acd6a9cc676004f593e2bc23434fdf81a05dc06a0fa2d4957.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1916 a12f12687d68214acd6a9cc676004f593e2bc23434fdf81a05dc06a0fa2d4957.exe 1916 a12f12687d68214acd6a9cc676004f593e2bc23434fdf81a05dc06a0fa2d4957.exe 2524 svchcst.exe 4584 svchcst.exe 2524 svchcst.exe 4584 svchcst.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1916 wrote to memory of 944 1916 a12f12687d68214acd6a9cc676004f593e2bc23434fdf81a05dc06a0fa2d4957.exe 86 PID 1916 wrote to memory of 944 1916 a12f12687d68214acd6a9cc676004f593e2bc23434fdf81a05dc06a0fa2d4957.exe 86 PID 1916 wrote to memory of 944 1916 a12f12687d68214acd6a9cc676004f593e2bc23434fdf81a05dc06a0fa2d4957.exe 86 PID 1916 wrote to memory of 1292 1916 a12f12687d68214acd6a9cc676004f593e2bc23434fdf81a05dc06a0fa2d4957.exe 87 PID 1916 wrote to memory of 1292 1916 a12f12687d68214acd6a9cc676004f593e2bc23434fdf81a05dc06a0fa2d4957.exe 87 PID 1916 wrote to memory of 1292 1916 a12f12687d68214acd6a9cc676004f593e2bc23434fdf81a05dc06a0fa2d4957.exe 87 PID 1292 wrote to memory of 4584 1292 WScript.exe 89 PID 1292 wrote to memory of 4584 1292 WScript.exe 89 PID 1292 wrote to memory of 4584 1292 WScript.exe 89 PID 944 wrote to memory of 2524 944 WScript.exe 90 PID 944 wrote to memory of 2524 944 WScript.exe 90 PID 944 wrote to memory of 2524 944 WScript.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\a12f12687d68214acd6a9cc676004f593e2bc23434fdf81a05dc06a0fa2d4957.exe"C:\Users\Admin\AppData\Local\Temp\a12f12687d68214acd6a9cc676004f593e2bc23434fdf81a05dc06a0fa2d4957.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2524
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4584
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
753B
MD5bf774661dc29e5a7b62ec66017483f0a
SHA167aa73da06eb1b2744f618174614e675a2451bee
SHA2561628d518d9cdf974529a7a86ad69ed58cf7057ea707806241cc9d8d6fa0ea6dd
SHA512ffc89f2b33a3bbedea1c663fb377bee6efb33520aca50513e0502b1d5dc95b7e6cc97ea06310c5c4a7189e82d51946f25534fc2f6170834c48c1b903e7233b03
-
Filesize
1.1MB
MD544ea7e8e42052239eb4fe8220c332185
SHA118465f66489a30541d562baa198c23a5996bcd69
SHA2566b8df17dde2286838bda8681413278fe7b0e8300bb5257045d868a970f939fbb
SHA5120f048cdef8f111fdbbc0133a1a3cf0ea0d149b2b5aa11904276db0ec44cfa4899fd4d1a93ce729a300bd98b7494c3ec3b86d0b080ec12a68c5fc7334765ad2cc