Analysis
-
max time kernel
93s -
max time network
204s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10-09-2024 18:10
Static task
static1
Behavioral task
behavioral1
Sample
10092024_1810_RFQ_PurchaseOrder_BZ9948732094#Details.vbs
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
10092024_1810_RFQ_PurchaseOrder_BZ9948732094#Details.vbs
Resource
win10v2004-20240802-en
General
-
Target
10092024_1810_RFQ_PurchaseOrder_BZ9948732094#Details.vbs
-
Size
2.8MB
-
MD5
fc793d1ddd94bf4612112a71e9e3a296
-
SHA1
17879caaf12ba2e791ae70a61a73774ad6153fb8
-
SHA256
b2a8de950f8fa9fe37c06d4721f0414eae19a66e624741b0d740bedb6ea18e3f
-
SHA512
c72e68078ecc22f5bd70e62a3aa8dbd9f7f20f12b41f6f2946157e6edb409869953076a1fe117f89876cc11e1fd4066e2b37e7e2cbf130c14095335e5dd78596
-
SSDEEP
24576:zVJSwXj0BtHAVopK7cWKHHsooWOPJP9oBprt6S0lBxIkiSIm1XPCWVNC6opSlJcO:GQu9Z6A67+iJ+KOMy54YO7srodsZ8
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation WScript.exe -
Executes dropped EXE 2 IoCs
pid Process 216 x.exe 3944 x.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000a0000000233c2-4.dat autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2472 3944 WerFault.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language x.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language x.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 216 x.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 216 x.exe 216 x.exe 3944 x.exe 3944 x.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 216 x.exe 216 x.exe 3944 x.exe 3944 x.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2100 wrote to memory of 216 2100 WScript.exe 83 PID 2100 wrote to memory of 216 2100 WScript.exe 83 PID 2100 wrote to memory of 216 2100 WScript.exe 83 PID 216 wrote to memory of 4760 216 x.exe 87 PID 216 wrote to memory of 4760 216 x.exe 87 PID 216 wrote to memory of 4760 216 x.exe 87 PID 216 wrote to memory of 3944 216 x.exe 88 PID 216 wrote to memory of 3944 216 x.exe 88 PID 216 wrote to memory of 3944 216 x.exe 88 PID 3944 wrote to memory of 4520 3944 x.exe 90 PID 3944 wrote to memory of 4520 3944 x.exe 90 PID 3944 wrote to memory of 4520 3944 x.exe 90
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\10092024_1810_RFQ_PurchaseOrder_BZ9948732094#Details.vbs"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\x.exe"C:\Users\Admin\AppData\Local\Temp\x.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\x.exe"3⤵PID:4760
-
-
C:\Users\Admin\AppData\Local\Temp\x.exe"C:\Users\Admin\AppData\Local\Temp\x.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\x.exe"4⤵PID:4520
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3944 -s 7724⤵
- Program crash
PID:2472
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3944 -ip 39441⤵PID:2084
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD5644e4c33d6e5c3c2240b8c67b353d6e3
SHA14551112ee2bb5d7925ccbfccca975cd39a044d1b
SHA2564ea070f8c13c0c48bc51748e5b9675ebc7ab01662dc890646f3f6110fb464609
SHA51281f5ab8df0e109e64af261cef18ffd9e1f8775ba2084c1b5fe0b38d5d8551dd777ee53d202d496bf0836260611657bcf4d270407b324065d1b353194e5db06d6