Analysis
-
max time kernel
95s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/09/2024, 21:58
Static task
static1
Behavioral task
behavioral1
Sample
3cbfd504d67b3f3fb134915e48a0b2f8d962e3b64fd096794d1369fccb980da7.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3cbfd504d67b3f3fb134915e48a0b2f8d962e3b64fd096794d1369fccb980da7.exe
Resource
win10v2004-20240802-en
General
-
Target
3cbfd504d67b3f3fb134915e48a0b2f8d962e3b64fd096794d1369fccb980da7.exe
-
Size
1.1MB
-
MD5
f2520ef7238721a3b43f0000287bd400
-
SHA1
b425cceb32ad7666a6198486fcbe9e94bdda8827
-
SHA256
3cbfd504d67b3f3fb134915e48a0b2f8d962e3b64fd096794d1369fccb980da7
-
SHA512
45de398f3bcea9764e7127fde1df65583878a38c09fc34b4173a38bf5f3bba7ba1faf9f92d24128da12e80410f3bda662781ab999292ff2d1fb2ad7450b742ca
-
SSDEEP
24576:aH0dl8myX9Bg42QoXFkrzkmplSgRDYo0lG4Z8r7Qfbkiu5Q2:acallSllG4ZM7QzMd
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation 3cbfd504d67b3f3fb134915e48a0b2f8d962e3b64fd096794d1369fccb980da7.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation WScript.exe -
Deletes itself 1 IoCs
pid Process 4804 svchcst.exe -
Executes dropped EXE 2 IoCs
pid Process 4804 svchcst.exe 1996 svchcst.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3cbfd504d67b3f3fb134915e48a0b2f8d962e3b64fd096794d1369fccb980da7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings 3cbfd504d67b3f3fb134915e48a0b2f8d962e3b64fd096794d1369fccb980da7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4944 3cbfd504d67b3f3fb134915e48a0b2f8d962e3b64fd096794d1369fccb980da7.exe 4944 3cbfd504d67b3f3fb134915e48a0b2f8d962e3b64fd096794d1369fccb980da7.exe 4944 3cbfd504d67b3f3fb134915e48a0b2f8d962e3b64fd096794d1369fccb980da7.exe 4944 3cbfd504d67b3f3fb134915e48a0b2f8d962e3b64fd096794d1369fccb980da7.exe 4804 svchcst.exe 4804 svchcst.exe 4804 svchcst.exe 4804 svchcst.exe 4804 svchcst.exe 4804 svchcst.exe 4804 svchcst.exe 4804 svchcst.exe 4804 svchcst.exe 4804 svchcst.exe 4804 svchcst.exe 4804 svchcst.exe 4804 svchcst.exe 4804 svchcst.exe 4804 svchcst.exe 4804 svchcst.exe 4804 svchcst.exe 4804 svchcst.exe 4804 svchcst.exe 4804 svchcst.exe 4804 svchcst.exe 4804 svchcst.exe 4804 svchcst.exe 4804 svchcst.exe 4804 svchcst.exe 4804 svchcst.exe 4804 svchcst.exe 4804 svchcst.exe 4804 svchcst.exe 4804 svchcst.exe 4804 svchcst.exe 4804 svchcst.exe 4804 svchcst.exe 4804 svchcst.exe 4804 svchcst.exe 4804 svchcst.exe 4804 svchcst.exe 4804 svchcst.exe 4804 svchcst.exe 4804 svchcst.exe 4804 svchcst.exe 4804 svchcst.exe 4804 svchcst.exe 4804 svchcst.exe 4804 svchcst.exe 4804 svchcst.exe 4804 svchcst.exe 4804 svchcst.exe 4804 svchcst.exe 4804 svchcst.exe 4804 svchcst.exe 4804 svchcst.exe 4804 svchcst.exe 4804 svchcst.exe 4804 svchcst.exe 4804 svchcst.exe 4804 svchcst.exe 4804 svchcst.exe 4804 svchcst.exe 4804 svchcst.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4944 3cbfd504d67b3f3fb134915e48a0b2f8d962e3b64fd096794d1369fccb980da7.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4944 3cbfd504d67b3f3fb134915e48a0b2f8d962e3b64fd096794d1369fccb980da7.exe 4944 3cbfd504d67b3f3fb134915e48a0b2f8d962e3b64fd096794d1369fccb980da7.exe 4804 svchcst.exe 4804 svchcst.exe 1996 svchcst.exe 1996 svchcst.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4944 wrote to memory of 1596 4944 3cbfd504d67b3f3fb134915e48a0b2f8d962e3b64fd096794d1369fccb980da7.exe 86 PID 4944 wrote to memory of 1596 4944 3cbfd504d67b3f3fb134915e48a0b2f8d962e3b64fd096794d1369fccb980da7.exe 86 PID 4944 wrote to memory of 1596 4944 3cbfd504d67b3f3fb134915e48a0b2f8d962e3b64fd096794d1369fccb980da7.exe 86 PID 4944 wrote to memory of 836 4944 3cbfd504d67b3f3fb134915e48a0b2f8d962e3b64fd096794d1369fccb980da7.exe 87 PID 4944 wrote to memory of 836 4944 3cbfd504d67b3f3fb134915e48a0b2f8d962e3b64fd096794d1369fccb980da7.exe 87 PID 4944 wrote to memory of 836 4944 3cbfd504d67b3f3fb134915e48a0b2f8d962e3b64fd096794d1369fccb980da7.exe 87 PID 1596 wrote to memory of 4804 1596 WScript.exe 90 PID 1596 wrote to memory of 4804 1596 WScript.exe 90 PID 1596 wrote to memory of 4804 1596 WScript.exe 90 PID 836 wrote to memory of 1996 836 WScript.exe 89 PID 836 wrote to memory of 1996 836 WScript.exe 89 PID 836 wrote to memory of 1996 836 WScript.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\3cbfd504d67b3f3fb134915e48a0b2f8d962e3b64fd096794d1369fccb980da7.exe"C:\Users\Admin\AppData\Local\Temp\3cbfd504d67b3f3fb134915e48a0b2f8d962e3b64fd096794d1369fccb980da7.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4804
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1996
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
753B
MD535a203fa305df53e9c3e764bb923e39f
SHA1614e42a96691487fc76f439565929ca47147bad9
SHA2561e28db93eef81e0ffa87e94c442fe239ec49e88bbadd4c0ebb5f906652343bfc
SHA512074c06cacebe15c3ab3275c31af2c7a6aff36bc72540c4d51f1d22ead0ed1ca86e87b343753cea087766c28c6f7a112c51e498084e79b5765de10cb01c6277e2
-
Filesize
1.1MB
MD5641e6eef8a3ac528cc1c7ba28b70fd61
SHA19dafdfade55ed905f02b902c749962d5bfde6ba7
SHA2560bbacd744acd7157a8d16869aa6c2d337780dd05eab2acd06cc718626809f55c
SHA512ff841f99364b94e6333086a6a48f282cb739b78227e0ba4da710929b731ea0ab67c6eccfeb9f6f54b8dbb7ef1ae93cdeb73e4e100d730a3981d958de62f37a06