Analysis

  • max time kernel
    107s
  • max time network
    108s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/08/2024, 07:05

General

  • Target

    7ec4e6877e8783a769493afb9eb754f0N.exe

  • Size

    1.1MB

  • MD5

    7ec4e6877e8783a769493afb9eb754f0

  • SHA1

    2c63dabc54daf728559e5b67eadc9a9cea0b622e

  • SHA256

    7a1d14c49171c53d6f0b5679a1070227a11026a165bfa23f59b1a29ba6bf2edf

  • SHA512

    cf307d06aae1f5acb9ec3b5cd864551d2897a9cdf399526c9ddd1da76ee1ead76e98a84d4f23386a87fcc92830f23760c0d21d3ec82ff28f11cb70d56b8830b6

  • SSDEEP

    24576:aH0dl8myX9Bg42QoXFkrzkmplSgRDYo0lG4Z8r7Qfbkiu5QL:acallSllG4ZM7QzMs

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 8 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 10 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7ec4e6877e8783a769493afb9eb754f0N.exe
    "C:\Users\Admin\AppData\Local\Temp\7ec4e6877e8783a769493afb9eb754f0N.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1200
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2076
      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
        3⤵
        • Checks computer location settings
        • Deletes itself
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2616
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
          4⤵
          • Checks computer location settings
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          PID:716
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
          4⤵
          • Checks computer location settings
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:636
          • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2668
            • C:\Windows\SysWOW64\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
              6⤵
              • Checks computer location settings
              • System Location Discovery: System Language Discovery
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:1040
              • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                7⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:1620
            • C:\Windows\SysWOW64\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
              6⤵
              • Checks computer location settings
              • System Location Discovery: System Language Discovery
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:4144
              • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                7⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:4556

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Config.ini

    Filesize

    92B

    MD5

    67b9b3e2ded7086f393ebbc36c5e7bca

    SHA1

    e6299d0450b9a92a18cc23b5704a2b475652c790

    SHA256

    44063c266686263f14cd2a83fee124fb3e61a9171a6aab69709464f49511011d

    SHA512

    826fbc9481f46b1ae3db828a665c55c349023caf563e6e8c17321f5f3af3e4c3914955db6f0eebfc6defe561315435d47310b4d0499ab9c2c85bb61264dedc09

  • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

    Filesize

    722B

    MD5

    5565d1bc8bcc37ee6c226abcc0169870

    SHA1

    971ffffcf4a1bae19c78ff310795e52b6e1faaf0

    SHA256

    9d940e04f896d319e2a4a7b608653ee869d40b8c12d2a63a65121d1eb30b9eba

    SHA512

    5f1df56ed91c4fb66c530ffbbf2d07e8f3af6c683052a78a2967bd0322a9087b758d4a140594df3ad589b4fb9552da5e753d6efac571776323ee84bbdd63d105

  • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

    Filesize

    696B

    MD5

    2af86d83545125b952334759f8554ae3

    SHA1

    ddfef7be6fbd8d8185c772a9a78eb18617a9637b

    SHA256

    7dd3660d7e87e64f451b4d1882d07c1733ce38d828770910453cc1b7f457d11d

    SHA512

    38d2854f941ff77a2fec871ba6513df9862fe4f86778b22053b4c3e25995b192f4ab943051a2c613cc3e78d275bc543b0dff09149cb4620e307809d20beae17b

  • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

    Filesize

    696B

    MD5

    aa6578debd9e5045ad239d59ebeb6d15

    SHA1

    2a25e6293914cd6ada6649f34506c8bcf35494aa

    SHA256

    7acb095ca5298eb1d1e2ba7f02c1b876d7d28684762a9d180ae2ed8c9e68beb2

    SHA512

    150796c7aad73d1732103e41bd01d3c181b4a0afd37b673d184d5c6c643622704e7692b668e231a319549c2bb378f4d83c7ede82caf81dd15c934b81936e22b2

  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    1.1MB

    MD5

    ee4d4abe36f9dc8bf92640ce92ae5fc1

    SHA1

    db0b642efa26a8ab9d7ba40e8aee114c1897ba2e

    SHA256

    985875599ab803ada14bf05673d5391f4689bb3aad0eb78ba091cdf7d74e21cd

    SHA512

    a61327d117b27479b7f79d446440d32787306438a840ed3a36bb5e8d5ffbf0147a99ce77af84245d0ce6db352aca578fbe0f8bbaf7ab9e0c4651f0281341aaf0

  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    1.1MB

    MD5

    2ff90c444b0e2feb3c20a184bb6cbb40

    SHA1

    6d4b9e5fb56813b6014879bc50e38feb60b7468a

    SHA256

    92de12cf935ff060190a5d92b16ed11df926afd3afc9393f9b85ca600ea1dc81

    SHA512

    cae0b6ef135f6ff984ed3be185be0c8e9a9b1587313429464b639d503c4ceec29b004ce548e8980fc4b1eb2763f3c159668a6a5e432d7f52e7591eb1b778f1a2

  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    1.1MB

    MD5

    060d4abc5465ac398f207985609a58c0

    SHA1

    aa192d45865649bef25c7c4be489945206d5498d

    SHA256

    53733e4bddd51909721abbcfe76cb7c8982faab346d25a7c35f7550cdae976dc

    SHA512

    9b8fb132b0f5002463affb7ff67c5be58dd139df622ca30f43b32e13f73726d0ad7304b298094b97a3687e0dc771fc3fa5ca5d107a646fb9fe30ced35b4333b2

  • memory/1200-0-0x0000000000400000-0x000000000055F000-memory.dmp

    Filesize

    1.4MB

  • memory/1200-9-0x0000000000400000-0x000000000055F000-memory.dmp

    Filesize

    1.4MB

  • memory/1620-40-0x0000000000400000-0x000000000055F000-memory.dmp

    Filesize

    1.4MB

  • memory/2616-22-0x0000000000400000-0x000000000055F000-memory.dmp

    Filesize

    1.4MB

  • memory/2668-35-0x0000000000400000-0x000000000055F000-memory.dmp

    Filesize

    1.4MB

  • memory/4556-39-0x0000000000400000-0x000000000055F000-memory.dmp

    Filesize

    1.4MB