Analysis
-
max time kernel
101s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-09-2024 20:26
Static task
static1
Behavioral task
behavioral1
Sample
4094a77af8766c0431a312e6d435ff536514f8124e51f8c4f12e9b41df12ea1a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4094a77af8766c0431a312e6d435ff536514f8124e51f8c4f12e9b41df12ea1a.exe
Resource
win10v2004-20240802-en
General
-
Target
4094a77af8766c0431a312e6d435ff536514f8124e51f8c4f12e9b41df12ea1a.exe
-
Size
1.1MB
-
MD5
692139bd235a83648043abf1a813f1a4
-
SHA1
830f005eeebeb9177307603ed3bcc71479cc8a3c
-
SHA256
4094a77af8766c0431a312e6d435ff536514f8124e51f8c4f12e9b41df12ea1a
-
SHA512
ab8e1c343840a4f50549dce13feb8eddb7ccdd2d3e1489d461647a6c1a6444dac32910f8f4e9fc655af05876e71d40310f206ee2cb0735b9e69dd7e4e0b0f675
-
SSDEEP
24576:aH0dl8myX9Bg42QoXFkrzkmplSgRDYo0lG4Z8r7Qfbkiu5Qm:acallSllG4ZM7QzMd
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation 4094a77af8766c0431a312e6d435ff536514f8124e51f8c4f12e9b41df12ea1a.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation WScript.exe -
Deletes itself 1 IoCs
pid Process 4840 svchcst.exe -
Executes dropped EXE 2 IoCs
pid Process 3024 svchcst.exe 4840 svchcst.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4094a77af8766c0431a312e6d435ff536514f8124e51f8c4f12e9b41df12ea1a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings 4094a77af8766c0431a312e6d435ff536514f8124e51f8c4f12e9b41df12ea1a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4876 4094a77af8766c0431a312e6d435ff536514f8124e51f8c4f12e9b41df12ea1a.exe 4876 4094a77af8766c0431a312e6d435ff536514f8124e51f8c4f12e9b41df12ea1a.exe 4876 4094a77af8766c0431a312e6d435ff536514f8124e51f8c4f12e9b41df12ea1a.exe 4876 4094a77af8766c0431a312e6d435ff536514f8124e51f8c4f12e9b41df12ea1a.exe 4840 svchcst.exe 4840 svchcst.exe 4840 svchcst.exe 4840 svchcst.exe 4840 svchcst.exe 4840 svchcst.exe 4840 svchcst.exe 4840 svchcst.exe 4840 svchcst.exe 4840 svchcst.exe 4840 svchcst.exe 4840 svchcst.exe 4840 svchcst.exe 4840 svchcst.exe 4840 svchcst.exe 4840 svchcst.exe 4840 svchcst.exe 4840 svchcst.exe 4840 svchcst.exe 4840 svchcst.exe 4840 svchcst.exe 4840 svchcst.exe 4840 svchcst.exe 4840 svchcst.exe 4840 svchcst.exe 4840 svchcst.exe 4840 svchcst.exe 4840 svchcst.exe 4840 svchcst.exe 4840 svchcst.exe 4840 svchcst.exe 4840 svchcst.exe 4840 svchcst.exe 4840 svchcst.exe 4840 svchcst.exe 4840 svchcst.exe 4840 svchcst.exe 4840 svchcst.exe 4840 svchcst.exe 4840 svchcst.exe 4840 svchcst.exe 4840 svchcst.exe 4840 svchcst.exe 4840 svchcst.exe 4840 svchcst.exe 4840 svchcst.exe 4840 svchcst.exe 4840 svchcst.exe 4840 svchcst.exe 4840 svchcst.exe 4840 svchcst.exe 4840 svchcst.exe 4840 svchcst.exe 4840 svchcst.exe 4840 svchcst.exe 4840 svchcst.exe 4840 svchcst.exe 4840 svchcst.exe 4840 svchcst.exe 4840 svchcst.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4876 4094a77af8766c0431a312e6d435ff536514f8124e51f8c4f12e9b41df12ea1a.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4876 4094a77af8766c0431a312e6d435ff536514f8124e51f8c4f12e9b41df12ea1a.exe 4876 4094a77af8766c0431a312e6d435ff536514f8124e51f8c4f12e9b41df12ea1a.exe 3024 svchcst.exe 4840 svchcst.exe 4840 svchcst.exe 3024 svchcst.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4876 wrote to memory of 960 4876 4094a77af8766c0431a312e6d435ff536514f8124e51f8c4f12e9b41df12ea1a.exe 87 PID 4876 wrote to memory of 960 4876 4094a77af8766c0431a312e6d435ff536514f8124e51f8c4f12e9b41df12ea1a.exe 87 PID 4876 wrote to memory of 960 4876 4094a77af8766c0431a312e6d435ff536514f8124e51f8c4f12e9b41df12ea1a.exe 87 PID 4876 wrote to memory of 3104 4876 4094a77af8766c0431a312e6d435ff536514f8124e51f8c4f12e9b41df12ea1a.exe 86 PID 4876 wrote to memory of 3104 4876 4094a77af8766c0431a312e6d435ff536514f8124e51f8c4f12e9b41df12ea1a.exe 86 PID 4876 wrote to memory of 3104 4876 4094a77af8766c0431a312e6d435ff536514f8124e51f8c4f12e9b41df12ea1a.exe 86 PID 960 wrote to memory of 3024 960 WScript.exe 93 PID 960 wrote to memory of 3024 960 WScript.exe 93 PID 960 wrote to memory of 3024 960 WScript.exe 93 PID 3104 wrote to memory of 4840 3104 WScript.exe 94 PID 3104 wrote to memory of 4840 3104 WScript.exe 94 PID 3104 wrote to memory of 4840 3104 WScript.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\4094a77af8766c0431a312e6d435ff536514f8124e51f8c4f12e9b41df12ea1a.exe"C:\Users\Admin\AppData\Local\Temp\4094a77af8766c0431a312e6d435ff536514f8124e51f8c4f12e9b41df12ea1a.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4840
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3024
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
753B
MD58bdd93e415964fa96cc1f7d2e1cf9ceb
SHA195a8f17089ce51e4a8ae498af2ebcd35916520ee
SHA256ada182d925d0a09dbe7b32bcba998a1b2e84fb00fd971fe53dfbd45abacfbfff
SHA512bcd016a0d6c7dbb98d47608087245d7d76968ad331c9539a2ecd73d880598d55c7a6714f06a7266f21816687bdf0cd003ee6da3a88355471b24336f83ce5161c
-
Filesize
1.1MB
MD57fe264cf26836b3ca847ebd7f1e777bf
SHA16f731e37df9c2a7e512f9764a84b0bc2c8d8b5e9
SHA256e027739c4aa946af21e33209a73391e33545c80f33fc2d735027fb16cae93aeb
SHA512795cb09c91f87f2b584f5164359a65453210c3a00dee373e93a1a741870f9feaee2c067445c39170c3b3cb24571b23e73329a22d6473d40e14c896ac181144cc