Analysis

  • max time kernel
    101s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-09-2024 20:26

General

  • Target

    4094a77af8766c0431a312e6d435ff536514f8124e51f8c4f12e9b41df12ea1a.exe

  • Size

    1.1MB

  • MD5

    692139bd235a83648043abf1a813f1a4

  • SHA1

    830f005eeebeb9177307603ed3bcc71479cc8a3c

  • SHA256

    4094a77af8766c0431a312e6d435ff536514f8124e51f8c4f12e9b41df12ea1a

  • SHA512

    ab8e1c343840a4f50549dce13feb8eddb7ccdd2d3e1489d461647a6c1a6444dac32910f8f4e9fc655af05876e71d40310f206ee2cb0735b9e69dd7e4e0b0f675

  • SSDEEP

    24576:aH0dl8myX9Bg42QoXFkrzkmplSgRDYo0lG4Z8r7Qfbkiu5Qm:acallSllG4ZM7QzMd

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4094a77af8766c0431a312e6d435ff536514f8124e51f8c4f12e9b41df12ea1a.exe
    "C:\Users\Admin\AppData\Local\Temp\4094a77af8766c0431a312e6d435ff536514f8124e51f8c4f12e9b41df12ea1a.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4876
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:3104
      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
        3⤵
        • Deletes itself
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:4840
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:960
      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3024

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

    Filesize

    753B

    MD5

    8bdd93e415964fa96cc1f7d2e1cf9ceb

    SHA1

    95a8f17089ce51e4a8ae498af2ebcd35916520ee

    SHA256

    ada182d925d0a09dbe7b32bcba998a1b2e84fb00fd971fe53dfbd45abacfbfff

    SHA512

    bcd016a0d6c7dbb98d47608087245d7d76968ad331c9539a2ecd73d880598d55c7a6714f06a7266f21816687bdf0cd003ee6da3a88355471b24336f83ce5161c

  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    1.1MB

    MD5

    7fe264cf26836b3ca847ebd7f1e777bf

    SHA1

    6f731e37df9c2a7e512f9764a84b0bc2c8d8b5e9

    SHA256

    e027739c4aa946af21e33209a73391e33545c80f33fc2d735027fb16cae93aeb

    SHA512

    795cb09c91f87f2b584f5164359a65453210c3a00dee373e93a1a741870f9feaee2c067445c39170c3b3cb24571b23e73329a22d6473d40e14c896ac181144cc

  • memory/3024-16-0x0000000000400000-0x000000000055F000-memory.dmp

    Filesize

    1.4MB

  • memory/4840-17-0x0000000000400000-0x000000000055F000-memory.dmp

    Filesize

    1.4MB

  • memory/4876-0-0x0000000000400000-0x000000000055F000-memory.dmp

    Filesize

    1.4MB

  • memory/4876-12-0x0000000000400000-0x000000000055F000-memory.dmp

    Filesize

    1.4MB