Analysis
-
max time kernel
136s -
max time network
109s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/08/2024, 19:34
Static task
static1
Behavioral task
behavioral1
Sample
12e61f40f914ea99b203307064e25e0ff1e8b79a3688611bb4975abecec76d18.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
12e61f40f914ea99b203307064e25e0ff1e8b79a3688611bb4975abecec76d18.exe
Resource
win10v2004-20240802-en
General
-
Target
12e61f40f914ea99b203307064e25e0ff1e8b79a3688611bb4975abecec76d18.exe
-
Size
1.1MB
-
MD5
95e3fff27465e405599915e1f94628b3
-
SHA1
27ea91700ad66e2441b31fc1794c79172f022c1a
-
SHA256
12e61f40f914ea99b203307064e25e0ff1e8b79a3688611bb4975abecec76d18
-
SHA512
cae7793ace438d31e727e61eb89db6ad0cdc8d7754c7ad4017b442d65b37b7d69bc45df6f0af8bfe3707a50d17133191e9dd5402e1e055c66320e90f46467d3c
-
SSDEEP
24576:CH0dl8myX9Bg42QoXFkrzkmmlSgRDko0lG4Z8r7Qfbkiu5Qj:CcaClSFlG4ZM7QzM0
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 8 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation svchcst.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation svchcst.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation 12e61f40f914ea99b203307064e25e0ff1e8b79a3688611bb4975abecec76d18.exe -
Deletes itself 1 IoCs
pid Process 2392 svchcst.exe -
Executes dropped EXE 4 IoCs
pid Process 2392 svchcst.exe 4768 svchcst.exe 3988 svchcst.exe 1088 svchcst.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 12e61f40f914ea99b203307064e25e0ff1e8b79a3688611bb4975abecec76d18.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe -
Modifies registry class 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings svchcst.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings 12e61f40f914ea99b203307064e25e0ff1e8b79a3688611bb4975abecec76d18.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings svchcst.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4556 12e61f40f914ea99b203307064e25e0ff1e8b79a3688611bb4975abecec76d18.exe 4556 12e61f40f914ea99b203307064e25e0ff1e8b79a3688611bb4975abecec76d18.exe 4556 12e61f40f914ea99b203307064e25e0ff1e8b79a3688611bb4975abecec76d18.exe 4556 12e61f40f914ea99b203307064e25e0ff1e8b79a3688611bb4975abecec76d18.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe 2392 svchcst.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4556 12e61f40f914ea99b203307064e25e0ff1e8b79a3688611bb4975abecec76d18.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 4556 12e61f40f914ea99b203307064e25e0ff1e8b79a3688611bb4975abecec76d18.exe 4556 12e61f40f914ea99b203307064e25e0ff1e8b79a3688611bb4975abecec76d18.exe 2392 svchcst.exe 2392 svchcst.exe 4768 svchcst.exe 4768 svchcst.exe 3988 svchcst.exe 1088 svchcst.exe 3988 svchcst.exe 1088 svchcst.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 4556 wrote to memory of 1264 4556 12e61f40f914ea99b203307064e25e0ff1e8b79a3688611bb4975abecec76d18.exe 87 PID 4556 wrote to memory of 1264 4556 12e61f40f914ea99b203307064e25e0ff1e8b79a3688611bb4975abecec76d18.exe 87 PID 4556 wrote to memory of 1264 4556 12e61f40f914ea99b203307064e25e0ff1e8b79a3688611bb4975abecec76d18.exe 87 PID 4556 wrote to memory of 1596 4556 12e61f40f914ea99b203307064e25e0ff1e8b79a3688611bb4975abecec76d18.exe 86 PID 4556 wrote to memory of 1596 4556 12e61f40f914ea99b203307064e25e0ff1e8b79a3688611bb4975abecec76d18.exe 86 PID 4556 wrote to memory of 1596 4556 12e61f40f914ea99b203307064e25e0ff1e8b79a3688611bb4975abecec76d18.exe 86 PID 1264 wrote to memory of 2392 1264 WScript.exe 91 PID 1264 wrote to memory of 2392 1264 WScript.exe 91 PID 1264 wrote to memory of 2392 1264 WScript.exe 91 PID 2392 wrote to memory of 4636 2392 svchcst.exe 92 PID 2392 wrote to memory of 4636 2392 svchcst.exe 92 PID 2392 wrote to memory of 4636 2392 svchcst.exe 92 PID 2392 wrote to memory of 5104 2392 svchcst.exe 93 PID 2392 wrote to memory of 5104 2392 svchcst.exe 93 PID 2392 wrote to memory of 5104 2392 svchcst.exe 93 PID 4636 wrote to memory of 4768 4636 WScript.exe 98 PID 4636 wrote to memory of 4768 4636 WScript.exe 98 PID 4636 wrote to memory of 4768 4636 WScript.exe 98 PID 4768 wrote to memory of 2252 4768 svchcst.exe 99 PID 4768 wrote to memory of 2252 4768 svchcst.exe 99 PID 4768 wrote to memory of 2252 4768 svchcst.exe 99 PID 4768 wrote to memory of 1628 4768 svchcst.exe 100 PID 4768 wrote to memory of 1628 4768 svchcst.exe 100 PID 4768 wrote to memory of 1628 4768 svchcst.exe 100 PID 2252 wrote to memory of 3988 2252 WScript.exe 103 PID 2252 wrote to memory of 3988 2252 WScript.exe 103 PID 2252 wrote to memory of 3988 2252 WScript.exe 103 PID 1628 wrote to memory of 1088 1628 WScript.exe 104 PID 1628 wrote to memory of 1088 1628 WScript.exe 104 PID 1628 wrote to memory of 1088 1628 WScript.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\12e61f40f914ea99b203307064e25e0ff1e8b79a3688611bb4975abecec76d18.exe"C:\Users\Admin\AppData\Local\Temp\12e61f40f914ea99b203307064e25e0ff1e8b79a3688611bb4975abecec76d18.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1596
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"6⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3988
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"6⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1088
-
-
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"4⤵
- System Location Discovery: System Language Discovery
PID:5104
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92B
MD567b9b3e2ded7086f393ebbc36c5e7bca
SHA1e6299d0450b9a92a18cc23b5704a2b475652c790
SHA25644063c266686263f14cd2a83fee124fb3e61a9171a6aab69709464f49511011d
SHA512826fbc9481f46b1ae3db828a665c55c349023caf563e6e8c17321f5f3af3e4c3914955db6f0eebfc6defe561315435d47310b4d0499ab9c2c85bb61264dedc09
-
Filesize
753B
MD5a84e14845a56db1ade77e23e8a5b75f4
SHA15ceff96571abd4001466048a33224e874b7d9bef
SHA25690119ca0ddae5803707d2902d56b6e3c4067442bbafc3cc0e04e7108ec11e06d
SHA5125c0de5286f063a3844f669be7b1ad75615f1509811fc6dcb717d6a6f9ad27af02ed016021f5ce7716a6fc136efaa135a51630bdc1ea7377ac9bf3d29c55dfee6
-
Filesize
696B
MD51106df09ec5fdde059876fabb3b189f8
SHA1ff325b628bb07f43bc277ad1b343ca9b797324f1
SHA256646d2e16d16c0dc4f95a42ab11dd666e4ecb28752154e1586316faa059fa0829
SHA5120503a6256c3b327ee4f56644baa5d4237e00877e3502e044d3d698626d32e05f0ec2a71187ce371cf7d68f888e8ceb43a0212b8cce3e74d8f5607c21e574db86
-
Filesize
696B
MD533923002ff087d4e9d20dc9167bf4b6f
SHA1cd218dc8073081f7329889f96e1159c6d11fb8a1
SHA256f24781ed9f535b0d29cbef666b2e299ee84ab75c48fd47bfdf0e9c2beaa0796e
SHA512628c465e3ebed9b3ad689a6fa1fe38d3194c69a7446320408c28667acd49a157b853f734325e828a1577810393d0f9e69b6719bd7c201816ef0f06219a26534c
-
Filesize
1.1MB
MD5bb243b1e46ebecca55b8adb15fedfd1d
SHA17bba33ee1e36457a486afdb5098597a0416b5ce9
SHA256a74ac26d3f27f18181ea0f3a8913d9e681c50f3c00f85138f5056398a6f8d4f1
SHA5124677baca7d0e8746b221a1624945a63c0ecec343be2b435a6a3ba3bebed81cd52f5807b67af1fd10b11378ce5135cce6dead9f1a53121970e58e895df1ca0079
-
Filesize
1.1MB
MD5bb7665804bcc7d66df910f4622ce12f1
SHA1ba5d8982375b3706583f7ed1deb877646942cf45
SHA256fd05673215b92a19f4777c1caa622f30164d4aac6930e0ebed8aee96bf49021f
SHA5128ea2851e29385a2705ddfc7e0b4a4e706f1b1abda3db07f4ae338dc364fe57b557097f4cb1c91511d804927724e8372ba542c48a7ddd62afcee681224bea4b81
-
Filesize
1.1MB
MD5b5effc8f95ac39b107621faa10b1104b
SHA154795660bea5917a66128ea74cc7b503bac42dd1
SHA256aad43530b5f5cd11cd8de035023575e98fafb9dda47b08b6bdddbd3a4618b1c3
SHA51246017a86b9b6ece289bb8b0e972730debc6628bff5cb66416fd8ca9186079670b8899df6de73edd1f72cd6a9bbe5ae149669afab23faf57beef1788e641e53c2