Analysis
-
max time kernel
95s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08-09-2024 10:43
Static task
static1
Behavioral task
behavioral1
Sample
5e4583c6479000d634552f0c23e4a590cbcf6bd181b9ac8d130d18872879ea24.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5e4583c6479000d634552f0c23e4a590cbcf6bd181b9ac8d130d18872879ea24.exe
Resource
win10v2004-20240802-en
General
-
Target
5e4583c6479000d634552f0c23e4a590cbcf6bd181b9ac8d130d18872879ea24.exe
-
Size
1.1MB
-
MD5
2314f8f414886a307e856550b634d1ba
-
SHA1
9458579c61b98fc134ad36ad9610e42afc84e026
-
SHA256
5e4583c6479000d634552f0c23e4a590cbcf6bd181b9ac8d130d18872879ea24
-
SHA512
6a8447f142befbd4d5f91501e042746b459ae1e0ce97b3159be5514e8a8b7bf4a2f695c428be4e33657c7949d551040b698b3e0aa0bde9a52a3d6bcc83bf4edf
-
SSDEEP
24576:CH0dl8myX9Bg42QoXFkrzkmmlSgRDko0lG4Z8r7Qfbkiu5QJ:CcaClSFlG4ZM7QzM6
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation 5e4583c6479000d634552f0c23e4a590cbcf6bd181b9ac8d130d18872879ea24.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation WScript.exe -
Deletes itself 1 IoCs
pid Process 2332 svchcst.exe -
Executes dropped EXE 2 IoCs
pid Process 2332 svchcst.exe 1880 svchcst.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5e4583c6479000d634552f0c23e4a590cbcf6bd181b9ac8d130d18872879ea24.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings 5e4583c6479000d634552f0c23e4a590cbcf6bd181b9ac8d130d18872879ea24.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3372 5e4583c6479000d634552f0c23e4a590cbcf6bd181b9ac8d130d18872879ea24.exe 3372 5e4583c6479000d634552f0c23e4a590cbcf6bd181b9ac8d130d18872879ea24.exe 3372 5e4583c6479000d634552f0c23e4a590cbcf6bd181b9ac8d130d18872879ea24.exe 3372 5e4583c6479000d634552f0c23e4a590cbcf6bd181b9ac8d130d18872879ea24.exe 2332 svchcst.exe 2332 svchcst.exe 2332 svchcst.exe 2332 svchcst.exe 2332 svchcst.exe 2332 svchcst.exe 2332 svchcst.exe 2332 svchcst.exe 2332 svchcst.exe 2332 svchcst.exe 2332 svchcst.exe 2332 svchcst.exe 2332 svchcst.exe 2332 svchcst.exe 2332 svchcst.exe 2332 svchcst.exe 2332 svchcst.exe 2332 svchcst.exe 2332 svchcst.exe 2332 svchcst.exe 2332 svchcst.exe 2332 svchcst.exe 2332 svchcst.exe 2332 svchcst.exe 2332 svchcst.exe 2332 svchcst.exe 2332 svchcst.exe 2332 svchcst.exe 2332 svchcst.exe 2332 svchcst.exe 2332 svchcst.exe 2332 svchcst.exe 2332 svchcst.exe 2332 svchcst.exe 2332 svchcst.exe 2332 svchcst.exe 2332 svchcst.exe 2332 svchcst.exe 2332 svchcst.exe 2332 svchcst.exe 2332 svchcst.exe 2332 svchcst.exe 2332 svchcst.exe 2332 svchcst.exe 2332 svchcst.exe 2332 svchcst.exe 2332 svchcst.exe 2332 svchcst.exe 2332 svchcst.exe 2332 svchcst.exe 2332 svchcst.exe 2332 svchcst.exe 2332 svchcst.exe 2332 svchcst.exe 2332 svchcst.exe 2332 svchcst.exe 2332 svchcst.exe 2332 svchcst.exe 2332 svchcst.exe 2332 svchcst.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3372 5e4583c6479000d634552f0c23e4a590cbcf6bd181b9ac8d130d18872879ea24.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3372 5e4583c6479000d634552f0c23e4a590cbcf6bd181b9ac8d130d18872879ea24.exe 3372 5e4583c6479000d634552f0c23e4a590cbcf6bd181b9ac8d130d18872879ea24.exe 1880 svchcst.exe 2332 svchcst.exe 1880 svchcst.exe 2332 svchcst.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3372 wrote to memory of 2400 3372 5e4583c6479000d634552f0c23e4a590cbcf6bd181b9ac8d130d18872879ea24.exe 85 PID 3372 wrote to memory of 2400 3372 5e4583c6479000d634552f0c23e4a590cbcf6bd181b9ac8d130d18872879ea24.exe 85 PID 3372 wrote to memory of 2400 3372 5e4583c6479000d634552f0c23e4a590cbcf6bd181b9ac8d130d18872879ea24.exe 85 PID 3372 wrote to memory of 1672 3372 5e4583c6479000d634552f0c23e4a590cbcf6bd181b9ac8d130d18872879ea24.exe 86 PID 3372 wrote to memory of 1672 3372 5e4583c6479000d634552f0c23e4a590cbcf6bd181b9ac8d130d18872879ea24.exe 86 PID 3372 wrote to memory of 1672 3372 5e4583c6479000d634552f0c23e4a590cbcf6bd181b9ac8d130d18872879ea24.exe 86 PID 1672 wrote to memory of 2332 1672 WScript.exe 88 PID 1672 wrote to memory of 2332 1672 WScript.exe 88 PID 1672 wrote to memory of 2332 1672 WScript.exe 88 PID 2400 wrote to memory of 1880 2400 WScript.exe 89 PID 2400 wrote to memory of 1880 2400 WScript.exe 89 PID 2400 wrote to memory of 1880 2400 WScript.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\5e4583c6479000d634552f0c23e4a590cbcf6bd181b9ac8d130d18872879ea24.exe"C:\Users\Admin\AppData\Local\Temp\5e4583c6479000d634552f0c23e4a590cbcf6bd181b9ac8d130d18872879ea24.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1880
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2332
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
753B
MD5cb0feb01ad05db923072b4942b9e1819
SHA19bfb8aa4b5e5e39851020c662216a303f1e6e0e2
SHA2562e0c8bc19bdb8a3db219a7442346decc42f2bd827f4f19b1b10d3aa5ae317010
SHA512b17da43daf2397b41086148027d34df74a27d64b1a201e0c5d2913cf45970871db2acc2eeb330bed36bfde56be46f710e2363adf56d4c73b0fd637a0d766fbf1
-
Filesize
1.1MB
MD509243d77a8b43c16a0043431dd26e159
SHA1209acde76f413a0c65717157f3c82574c8ffafc5
SHA256d32ce09c1c061a75ae996dec6830742bb70683f52ab171774ee13c7b8cc97296
SHA512794b51a5f8b712339e1217b1770a78b88ce83679754e8b8a2b8be9eed48fe18fba66fa33250992e8d41e5d3779127f28e54054f1afb0fe0d03b33b91d7bc4d84