Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08-09-2024 10:42
Static task
static1
Behavioral task
behavioral1
Sample
d7b727fc7184a9e106c26aa8b8371271f3962db1ad67b159212bb4428ae8ffc6.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d7b727fc7184a9e106c26aa8b8371271f3962db1ad67b159212bb4428ae8ffc6.exe
Resource
win10v2004-20240802-en
General
-
Target
d7b727fc7184a9e106c26aa8b8371271f3962db1ad67b159212bb4428ae8ffc6.exe
-
Size
1.1MB
-
MD5
d21db1ac63f9e34d3d8b25c76021ff76
-
SHA1
8d178e175e439dff8bf17348cf9ecba4975460b8
-
SHA256
d7b727fc7184a9e106c26aa8b8371271f3962db1ad67b159212bb4428ae8ffc6
-
SHA512
7454e75753bcfe9f28bb1a3bf96def7fc643675f1cc2a40e3cf8b22443c33d56be70794a0d6e2088490faccb315db5bc95f4bb7769f71133fcac1e7219f886d0
-
SSDEEP
24576:aH0dl8myX9Bg42QoXFkrzkmplSgRDYo0lG4Z8r7Qfbkiu5Qd:acallSllG4ZM7QzMW
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation d7b727fc7184a9e106c26aa8b8371271f3962db1ad67b159212bb4428ae8ffc6.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation WScript.exe -
Deletes itself 1 IoCs
pid Process 384 svchcst.exe -
Executes dropped EXE 2 IoCs
pid Process 4588 svchcst.exe 384 svchcst.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d7b727fc7184a9e106c26aa8b8371271f3962db1ad67b159212bb4428ae8ffc6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000_Classes\Local Settings d7b727fc7184a9e106c26aa8b8371271f3962db1ad67b159212bb4428ae8ffc6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2740 d7b727fc7184a9e106c26aa8b8371271f3962db1ad67b159212bb4428ae8ffc6.exe 2740 d7b727fc7184a9e106c26aa8b8371271f3962db1ad67b159212bb4428ae8ffc6.exe 2740 d7b727fc7184a9e106c26aa8b8371271f3962db1ad67b159212bb4428ae8ffc6.exe 2740 d7b727fc7184a9e106c26aa8b8371271f3962db1ad67b159212bb4428ae8ffc6.exe 384 svchcst.exe 384 svchcst.exe 384 svchcst.exe 384 svchcst.exe 384 svchcst.exe 384 svchcst.exe 384 svchcst.exe 384 svchcst.exe 384 svchcst.exe 384 svchcst.exe 384 svchcst.exe 384 svchcst.exe 384 svchcst.exe 384 svchcst.exe 384 svchcst.exe 384 svchcst.exe 384 svchcst.exe 384 svchcst.exe 384 svchcst.exe 384 svchcst.exe 384 svchcst.exe 384 svchcst.exe 384 svchcst.exe 384 svchcst.exe 384 svchcst.exe 384 svchcst.exe 384 svchcst.exe 384 svchcst.exe 384 svchcst.exe 384 svchcst.exe 384 svchcst.exe 384 svchcst.exe 384 svchcst.exe 384 svchcst.exe 384 svchcst.exe 384 svchcst.exe 384 svchcst.exe 384 svchcst.exe 384 svchcst.exe 384 svchcst.exe 384 svchcst.exe 384 svchcst.exe 384 svchcst.exe 384 svchcst.exe 384 svchcst.exe 384 svchcst.exe 384 svchcst.exe 384 svchcst.exe 384 svchcst.exe 384 svchcst.exe 384 svchcst.exe 384 svchcst.exe 384 svchcst.exe 384 svchcst.exe 384 svchcst.exe 384 svchcst.exe 384 svchcst.exe 384 svchcst.exe 384 svchcst.exe 384 svchcst.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2740 d7b727fc7184a9e106c26aa8b8371271f3962db1ad67b159212bb4428ae8ffc6.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2740 d7b727fc7184a9e106c26aa8b8371271f3962db1ad67b159212bb4428ae8ffc6.exe 2740 d7b727fc7184a9e106c26aa8b8371271f3962db1ad67b159212bb4428ae8ffc6.exe 384 svchcst.exe 384 svchcst.exe 4588 svchcst.exe 4588 svchcst.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2740 wrote to memory of 1012 2740 d7b727fc7184a9e106c26aa8b8371271f3962db1ad67b159212bb4428ae8ffc6.exe 86 PID 2740 wrote to memory of 1012 2740 d7b727fc7184a9e106c26aa8b8371271f3962db1ad67b159212bb4428ae8ffc6.exe 86 PID 2740 wrote to memory of 1012 2740 d7b727fc7184a9e106c26aa8b8371271f3962db1ad67b159212bb4428ae8ffc6.exe 86 PID 2740 wrote to memory of 1592 2740 d7b727fc7184a9e106c26aa8b8371271f3962db1ad67b159212bb4428ae8ffc6.exe 87 PID 2740 wrote to memory of 1592 2740 d7b727fc7184a9e106c26aa8b8371271f3962db1ad67b159212bb4428ae8ffc6.exe 87 PID 2740 wrote to memory of 1592 2740 d7b727fc7184a9e106c26aa8b8371271f3962db1ad67b159212bb4428ae8ffc6.exe 87 PID 1012 wrote to memory of 4588 1012 WScript.exe 89 PID 1012 wrote to memory of 4588 1012 WScript.exe 89 PID 1012 wrote to memory of 4588 1012 WScript.exe 89 PID 1592 wrote to memory of 384 1592 WScript.exe 90 PID 1592 wrote to memory of 384 1592 WScript.exe 90 PID 1592 wrote to memory of 384 1592 WScript.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\d7b727fc7184a9e106c26aa8b8371271f3962db1ad67b159212bb4428ae8ffc6.exe"C:\Users\Admin\AppData\Local\Temp\d7b727fc7184a9e106c26aa8b8371271f3962db1ad67b159212bb4428ae8ffc6.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4588
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:384
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
753B
MD5dba4cfd0bf1aceeae138143dd3fe2e90
SHA11afd5a262b816d52a623ad3b0737b3f5314396b0
SHA256d758d85adf85ec8732e0ca95e446ed8697657749f0084e91d0956654335afb3d
SHA512192f5a9b811896e4b31e12b5a2a161273c014dcdf996803a350de1f1de604db30ddf6c0a43736accbd5596c5626f658b30115782c383eb8ac17b94fdd7e79418
-
Filesize
1.1MB
MD590bc2a0ee63c81cff038f1690aa1ae68
SHA18cebb04d6ea2d2d4dd64bb99d757ec0786e00b73
SHA2566a513f17a54addc5a65222a6dabeecfaef56e783ae2c3acd41931c72e976da01
SHA512d90b4b64fb168436bed4dd9257079f89a40ac3c517c4a6b6b4315c874c0205a25e7b083dc5a6db22026c27fc0e66866541dfa99a1f8374b3925cf08597b259a4