Analysis
-
max time kernel
107s -
max time network
108s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
26/08/2024, 07:05
Static task
static1
Behavioral task
behavioral1
Sample
7ec4e6877e8783a769493afb9eb754f0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
7ec4e6877e8783a769493afb9eb754f0N.exe
Resource
win10v2004-20240802-en
General
-
Target
7ec4e6877e8783a769493afb9eb754f0N.exe
-
Size
1.1MB
-
MD5
7ec4e6877e8783a769493afb9eb754f0
-
SHA1
2c63dabc54daf728559e5b67eadc9a9cea0b622e
-
SHA256
7a1d14c49171c53d6f0b5679a1070227a11026a165bfa23f59b1a29ba6bf2edf
-
SHA512
cf307d06aae1f5acb9ec3b5cd864551d2897a9cdf399526c9ddd1da76ee1ead76e98a84d4f23386a87fcc92830f23760c0d21d3ec82ff28f11cb70d56b8830b6
-
SSDEEP
24576:aH0dl8myX9Bg42QoXFkrzkmplSgRDYo0lG4Z8r7Qfbkiu5QL:acallSllG4ZM7QzMs
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 8 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation 7ec4e6877e8783a769493afb9eb754f0N.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation svchcst.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation svchcst.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation WScript.exe -
Deletes itself 1 IoCs
pid Process 2616 svchcst.exe -
Executes dropped EXE 4 IoCs
pid Process 2616 svchcst.exe 2668 svchcst.exe 4556 svchcst.exe 1620 svchcst.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7ec4e6877e8783a769493afb9eb754f0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe -
Modifies registry class 8 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings svchcst.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings svchcst.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings 7ec4e6877e8783a769493afb9eb754f0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1200 7ec4e6877e8783a769493afb9eb754f0N.exe 1200 7ec4e6877e8783a769493afb9eb754f0N.exe 1200 7ec4e6877e8783a769493afb9eb754f0N.exe 1200 7ec4e6877e8783a769493afb9eb754f0N.exe 2616 svchcst.exe 2616 svchcst.exe 2616 svchcst.exe 2616 svchcst.exe 2616 svchcst.exe 2616 svchcst.exe 2616 svchcst.exe 2616 svchcst.exe 2616 svchcst.exe 2616 svchcst.exe 2616 svchcst.exe 2616 svchcst.exe 2616 svchcst.exe 2616 svchcst.exe 2616 svchcst.exe 2616 svchcst.exe 2616 svchcst.exe 2616 svchcst.exe 2616 svchcst.exe 2616 svchcst.exe 2616 svchcst.exe 2616 svchcst.exe 2616 svchcst.exe 2616 svchcst.exe 2616 svchcst.exe 2616 svchcst.exe 2616 svchcst.exe 2616 svchcst.exe 2616 svchcst.exe 2616 svchcst.exe 2616 svchcst.exe 2616 svchcst.exe 2616 svchcst.exe 2616 svchcst.exe 2616 svchcst.exe 2616 svchcst.exe 2616 svchcst.exe 2616 svchcst.exe 2616 svchcst.exe 2616 svchcst.exe 2616 svchcst.exe 2616 svchcst.exe 2616 svchcst.exe 2616 svchcst.exe 2616 svchcst.exe 2616 svchcst.exe 2616 svchcst.exe 2616 svchcst.exe 2616 svchcst.exe 2616 svchcst.exe 2616 svchcst.exe 2616 svchcst.exe 2616 svchcst.exe 2616 svchcst.exe 2616 svchcst.exe 2616 svchcst.exe 2616 svchcst.exe 2616 svchcst.exe 2616 svchcst.exe 2616 svchcst.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1200 7ec4e6877e8783a769493afb9eb754f0N.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 1200 7ec4e6877e8783a769493afb9eb754f0N.exe 1200 7ec4e6877e8783a769493afb9eb754f0N.exe 2616 svchcst.exe 2616 svchcst.exe 2668 svchcst.exe 2668 svchcst.exe 1620 svchcst.exe 4556 svchcst.exe 1620 svchcst.exe 4556 svchcst.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 1200 wrote to memory of 2076 1200 7ec4e6877e8783a769493afb9eb754f0N.exe 87 PID 1200 wrote to memory of 2076 1200 7ec4e6877e8783a769493afb9eb754f0N.exe 87 PID 1200 wrote to memory of 2076 1200 7ec4e6877e8783a769493afb9eb754f0N.exe 87 PID 2076 wrote to memory of 2616 2076 WScript.exe 93 PID 2076 wrote to memory of 2616 2076 WScript.exe 93 PID 2076 wrote to memory of 2616 2076 WScript.exe 93 PID 2616 wrote to memory of 636 2616 svchcst.exe 95 PID 2616 wrote to memory of 636 2616 svchcst.exe 95 PID 2616 wrote to memory of 636 2616 svchcst.exe 95 PID 2616 wrote to memory of 716 2616 svchcst.exe 94 PID 2616 wrote to memory of 716 2616 svchcst.exe 94 PID 2616 wrote to memory of 716 2616 svchcst.exe 94 PID 636 wrote to memory of 2668 636 WScript.exe 98 PID 636 wrote to memory of 2668 636 WScript.exe 98 PID 636 wrote to memory of 2668 636 WScript.exe 98 PID 2668 wrote to memory of 1040 2668 svchcst.exe 99 PID 2668 wrote to memory of 1040 2668 svchcst.exe 99 PID 2668 wrote to memory of 1040 2668 svchcst.exe 99 PID 2668 wrote to memory of 4144 2668 svchcst.exe 100 PID 2668 wrote to memory of 4144 2668 svchcst.exe 100 PID 2668 wrote to memory of 4144 2668 svchcst.exe 100 PID 4144 wrote to memory of 4556 4144 WScript.exe 101 PID 4144 wrote to memory of 4556 4144 WScript.exe 101 PID 4144 wrote to memory of 4556 4144 WScript.exe 101 PID 1040 wrote to memory of 1620 1040 WScript.exe 102 PID 1040 wrote to memory of 1620 1040 WScript.exe 102 PID 1040 wrote to memory of 1620 1040 WScript.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\7ec4e6877e8783a769493afb9eb754f0N.exe"C:\Users\Admin\AppData\Local\Temp\7ec4e6877e8783a769493afb9eb754f0N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:716
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"6⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1620
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"6⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4556
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92B
MD567b9b3e2ded7086f393ebbc36c5e7bca
SHA1e6299d0450b9a92a18cc23b5704a2b475652c790
SHA25644063c266686263f14cd2a83fee124fb3e61a9171a6aab69709464f49511011d
SHA512826fbc9481f46b1ae3db828a665c55c349023caf563e6e8c17321f5f3af3e4c3914955db6f0eebfc6defe561315435d47310b4d0499ab9c2c85bb61264dedc09
-
Filesize
722B
MD55565d1bc8bcc37ee6c226abcc0169870
SHA1971ffffcf4a1bae19c78ff310795e52b6e1faaf0
SHA2569d940e04f896d319e2a4a7b608653ee869d40b8c12d2a63a65121d1eb30b9eba
SHA5125f1df56ed91c4fb66c530ffbbf2d07e8f3af6c683052a78a2967bd0322a9087b758d4a140594df3ad589b4fb9552da5e753d6efac571776323ee84bbdd63d105
-
Filesize
696B
MD52af86d83545125b952334759f8554ae3
SHA1ddfef7be6fbd8d8185c772a9a78eb18617a9637b
SHA2567dd3660d7e87e64f451b4d1882d07c1733ce38d828770910453cc1b7f457d11d
SHA51238d2854f941ff77a2fec871ba6513df9862fe4f86778b22053b4c3e25995b192f4ab943051a2c613cc3e78d275bc543b0dff09149cb4620e307809d20beae17b
-
Filesize
696B
MD5aa6578debd9e5045ad239d59ebeb6d15
SHA12a25e6293914cd6ada6649f34506c8bcf35494aa
SHA2567acb095ca5298eb1d1e2ba7f02c1b876d7d28684762a9d180ae2ed8c9e68beb2
SHA512150796c7aad73d1732103e41bd01d3c181b4a0afd37b673d184d5c6c643622704e7692b668e231a319549c2bb378f4d83c7ede82caf81dd15c934b81936e22b2
-
Filesize
1.1MB
MD5ee4d4abe36f9dc8bf92640ce92ae5fc1
SHA1db0b642efa26a8ab9d7ba40e8aee114c1897ba2e
SHA256985875599ab803ada14bf05673d5391f4689bb3aad0eb78ba091cdf7d74e21cd
SHA512a61327d117b27479b7f79d446440d32787306438a840ed3a36bb5e8d5ffbf0147a99ce77af84245d0ce6db352aca578fbe0f8bbaf7ab9e0c4651f0281341aaf0
-
Filesize
1.1MB
MD52ff90c444b0e2feb3c20a184bb6cbb40
SHA16d4b9e5fb56813b6014879bc50e38feb60b7468a
SHA25692de12cf935ff060190a5d92b16ed11df926afd3afc9393f9b85ca600ea1dc81
SHA512cae0b6ef135f6ff984ed3be185be0c8e9a9b1587313429464b639d503c4ceec29b004ce548e8980fc4b1eb2763f3c159668a6a5e432d7f52e7591eb1b778f1a2
-
Filesize
1.1MB
MD5060d4abc5465ac398f207985609a58c0
SHA1aa192d45865649bef25c7c4be489945206d5498d
SHA25653733e4bddd51909721abbcfe76cb7c8982faab346d25a7c35f7550cdae976dc
SHA5129b8fb132b0f5002463affb7ff67c5be58dd139df622ca30f43b32e13f73726d0ad7304b298094b97a3687e0dc771fc3fa5ca5d107a646fb9fe30ced35b4333b2