Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-09-2024 10:42

General

  • Target

    d7b727fc7184a9e106c26aa8b8371271f3962db1ad67b159212bb4428ae8ffc6.exe

  • Size

    1.1MB

  • MD5

    d21db1ac63f9e34d3d8b25c76021ff76

  • SHA1

    8d178e175e439dff8bf17348cf9ecba4975460b8

  • SHA256

    d7b727fc7184a9e106c26aa8b8371271f3962db1ad67b159212bb4428ae8ffc6

  • SHA512

    7454e75753bcfe9f28bb1a3bf96def7fc643675f1cc2a40e3cf8b22443c33d56be70794a0d6e2088490faccb315db5bc95f4bb7769f71133fcac1e7219f886d0

  • SSDEEP

    24576:aH0dl8myX9Bg42QoXFkrzkmplSgRDYo0lG4Z8r7Qfbkiu5Qd:acallSllG4ZM7QzMW

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d7b727fc7184a9e106c26aa8b8371271f3962db1ad67b159212bb4428ae8ffc6.exe
    "C:\Users\Admin\AppData\Local\Temp\d7b727fc7184a9e106c26aa8b8371271f3962db1ad67b159212bb4428ae8ffc6.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2740
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1012
      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4588
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1592
      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
        3⤵
        • Deletes itself
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:384

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

    Filesize

    753B

    MD5

    dba4cfd0bf1aceeae138143dd3fe2e90

    SHA1

    1afd5a262b816d52a623ad3b0737b3f5314396b0

    SHA256

    d758d85adf85ec8732e0ca95e446ed8697657749f0084e91d0956654335afb3d

    SHA512

    192f5a9b811896e4b31e12b5a2a161273c014dcdf996803a350de1f1de604db30ddf6c0a43736accbd5596c5626f658b30115782c383eb8ac17b94fdd7e79418

  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    1.1MB

    MD5

    90bc2a0ee63c81cff038f1690aa1ae68

    SHA1

    8cebb04d6ea2d2d4dd64bb99d757ec0786e00b73

    SHA256

    6a513f17a54addc5a65222a6dabeecfaef56e783ae2c3acd41931c72e976da01

    SHA512

    d90b4b64fb168436bed4dd9257079f89a40ac3c517c4a6b6b4315c874c0205a25e7b083dc5a6db22026c27fc0e66866541dfa99a1f8374b3925cf08597b259a4

  • memory/384-16-0x0000000000400000-0x000000000055F000-memory.dmp

    Filesize

    1.4MB

  • memory/2740-0-0x0000000000400000-0x000000000055F000-memory.dmp

    Filesize

    1.4MB

  • memory/2740-11-0x0000000000400000-0x000000000055F000-memory.dmp

    Filesize

    1.4MB

  • memory/4588-15-0x0000000000400000-0x000000000055F000-memory.dmp

    Filesize

    1.4MB