Analysis

  • max time kernel
    118s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11/09/2024, 22:55

General

  • Target

    50dd5eebc1a896496548f437814aef96256d42eb211ed1a7735d4de373146fa0.exe

  • Size

    1.1MB

  • MD5

    1909eb9e93c1c9d6efef5f038140864a

  • SHA1

    797d902496d557493042be7955c14785de528531

  • SHA256

    50dd5eebc1a896496548f437814aef96256d42eb211ed1a7735d4de373146fa0

  • SHA512

    ce7af09f48e89637d7cdbd3355c58b9ad45857f31621019c3ed143c0fdd5152150c59973629214f0732ee36917eab40580d9ecfa43e3470033dcdc6fb0425d42

  • SSDEEP

    24576:CH0dl8myX9Bg42QoXFkrzkmmlSgRDko0lG4Z8r7Qfbkiu5Qt:CcaClSFlG4ZM7QzM2

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 16 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 18 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 18 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\50dd5eebc1a896496548f437814aef96256d42eb211ed1a7735d4de373146fa0.exe
    "C:\Users\Admin\AppData\Local\Temp\50dd5eebc1a896496548f437814aef96256d42eb211ed1a7735d4de373146fa0.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1884
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2412
      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
        3⤵
        • Deletes itself
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2640
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
          4⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2768
          • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2348
            • C:\Windows\SysWOW64\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
              6⤵
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:1280
              • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                7⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:2872
                • C:\Windows\SysWOW64\WScript.exe
                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                  8⤵
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:448
                  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                    "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                    9⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of SetWindowsHookEx
                    • Suspicious use of WriteProcessMemory
                    PID:2996
                    • C:\Windows\SysWOW64\WScript.exe
                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                      10⤵
                      • Loads dropped DLL
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of WriteProcessMemory
                      PID:2020
                      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                        "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                        11⤵
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        • Suspicious use of SetWindowsHookEx
                        • Suspicious use of WriteProcessMemory
                        PID:2204
                        • C:\Windows\SysWOW64\WScript.exe
                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                          12⤵
                          • Loads dropped DLL
                          • System Location Discovery: System Language Discovery
                          • Suspicious use of WriteProcessMemory
                          PID:716
                          • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                            "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                            13⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            • Suspicious use of SetWindowsHookEx
                            • Suspicious use of WriteProcessMemory
                            PID:1336
                            • C:\Windows\SysWOW64\WScript.exe
                              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                              14⤵
                              • Loads dropped DLL
                              • System Location Discovery: System Language Discovery
                              • Suspicious use of WriteProcessMemory
                              PID:1860
                              • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                15⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                • Suspicious use of SetWindowsHookEx
                                • Suspicious use of WriteProcessMemory
                                PID:1004
                                • C:\Windows\SysWOW64\WScript.exe
                                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                  16⤵
                                  • Loads dropped DLL
                                  • System Location Discovery: System Language Discovery
                                  PID:2580
                                  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                    "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                    17⤵
                                    • Executes dropped EXE
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious use of SetWindowsHookEx
                                    • Suspicious use of WriteProcessMemory
                                    PID:2912
                                    • C:\Windows\SysWOW64\WScript.exe
                                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                      18⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:2308

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Config.ini

    Filesize

    92B

    MD5

    67b9b3e2ded7086f393ebbc36c5e7bca

    SHA1

    e6299d0450b9a92a18cc23b5704a2b475652c790

    SHA256

    44063c266686263f14cd2a83fee124fb3e61a9171a6aab69709464f49511011d

    SHA512

    826fbc9481f46b1ae3db828a665c55c349023caf563e6e8c17321f5f3af3e4c3914955db6f0eebfc6defe561315435d47310b4d0499ab9c2c85bb61264dedc09

  • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

    Filesize

    753B

    MD5

    80ccf4055b03c9412c2bd1fd71750347

    SHA1

    5af4e64e4a522f335f6633a756b2f3d96660e5d0

    SHA256

    22753669dd3cb0e2768326754865b53c50591827dadcd6c554356256170ab972

    SHA512

    e50cf57a7eca87433930e280db3e57202dfb2f1cee14ae946558099fb24bb5a60ee6f06e6c8f1cfa64d31ba5fc5dfe3447b4f7810da85a6af3d6074f8ccaddba

  • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

    Filesize

    696B

    MD5

    f9d25791d9949ef33ed0c208f3d11851

    SHA1

    1cdf525209a1d7ade65168011e4de530de7bdc5a

    SHA256

    d3592a18c2a195dba2db76e25fb1516b2a9ef5297e9d72716e232d3540bc4481

    SHA512

    efb6f3882b9c75aa5193cf1bfeeb430b0a963681bf5367f535e3eb9c4e7c796c0aa1d0e3df9803c635ba6d863dc129a9ab30c954c6d4af27803036859d3d3113

  • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

    Filesize

    696B

    MD5

    f262d0722b88145e786399f42047785d

    SHA1

    9f4426b6ac52bb0456945b0619fcd355d118a0b7

    SHA256

    f20592c5d5216a153e7d9fc67c87e2d3346f3781014162462e824a5dbc4c7aef

    SHA512

    da8aa8fd4f84c224f7c6f3fe483b030e2307f3313c003f17f6b9c943f9ea9d052d9d9297f93fdf49428eedd235ef6d7efe0199e1620e55cb052f2ca3cb492eb1

  • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

    Filesize

    696B

    MD5

    98328aa8ad181fbf0b87edfc21155dce

    SHA1

    3ca100ca64d5f62a5dceef47f414c0953fd4f559

    SHA256

    a6928cf27564f6f983d8f62358463a2dee471715b220de03db8b72ebf105f20c

    SHA512

    75f298c982eeebf184fdd0612436583a863beba740bd55053539dc1b1c20103a1c6f5da46b41621eb00d601cdfc86c1705080a0da08fef7756637805dcb588ec

  • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

    Filesize

    696B

    MD5

    7f92a34f71720b04d60028801eb07932

    SHA1

    1701bae49609dc0ad1ab56823ae2414fd6c286c5

    SHA256

    b7445df62a392850e8ed07fba398dd5896625b6bcd694dfb5a02797ca2c637ee

    SHA512

    f5173fb410530956a6fcc8a15894c4186ae7fbac8e408714143359b476a2a2b1bd528cdb2e4647d1c16b99f108e452fb4fcb0a6db5eae6750fc6f6d8edd85360

  • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

    Filesize

    696B

    MD5

    8cb32754e88999ece2a392d94875313e

    SHA1

    da0ef4e297872b82db206ebdc4cafefeed2a4e3d

    SHA256

    3dc5ae697f3f5a3ffe053412e05a646883c49be29b179039ceadf5f71a595f9d

    SHA512

    a331a2472d0ef04f4d6a9b41a147020a688c96977feec8d61878f31382af8c27b8e990dc404137475d48f0155d600cc0d6ebe0a5d1cbb60b1fecf364301ebaa7

  • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

    Filesize

    696B

    MD5

    dabf4e9d32908d961aaffdd1c77d4879

    SHA1

    e41572d98b7452016fb004c843236377364ab1d3

    SHA256

    3488c64a6d2da3c00e50e954c495ac354ee504e54f3ed6dda6a991c5b9d33e19

    SHA512

    911d46aca8005857c86eddbb3cbbc4301ee5e173b2358a717053cf12727c06cc3b2d757ddf513f969dafe61c6b88d03b1478d8c483495f153e30bf64585195aa

  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    1.1MB

    MD5

    e9107bf7bcbdad3be8f49a59b3751e89

    SHA1

    80d279af75dae2581f712a445668fad2c0ac6dd9

    SHA256

    1e6b75471b352c4cb035efc801489fae4264484cec079d61419520b402eb5f3b

    SHA512

    d75341b14c9a554e4441913f84aedccf79e524b9e42c8a0639c6fcdc2353d70532c26b9e9cbeb007ff49006a55f624981dc88a668be9b5d74cc045fa5e288253

  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    1.1MB

    MD5

    7e90085344315100a8318fdff4f755a6

    SHA1

    5f2f36d0a7f2d5ac999ce92b898d199981fa2983

    SHA256

    b305922d8f0c167be88f54dd3070a26fbffd165067065fc7177879581660e5ec

    SHA512

    81ab2eca2275e5a7afee525a955deffd04149c5ef421f77033f03013adfdd2f1cacfc3461dcb397f2db4922ebfb320f3e0608af059396b004a737d8da5b287bd

  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    1.1MB

    MD5

    5f6f9ec2611ce7a19573f8870413eb05

    SHA1

    560c05a588c68e9227a617eb1d187beddd46bb0c

    SHA256

    320f8ddf57d097b6ed9f742e8fd7ccaf530601587764165c1ca3809b3f6c5729

    SHA512

    7be46b37642f3fbca67262b309febf2c7dcec24a1e75d7524b52298e229540fa7e51c3ab710a9d1ed08441ae24bc650ed022b3503c6f65c8910307b3b1ac4ed5

  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    1.1MB

    MD5

    f6c11001100e8dfc60ec06d4156394c5

    SHA1

    d5cd3032895c01a89716a4340e44e354f9215b34

    SHA256

    6d5c4038422eb6100b28d58ea34a3717490ddc6e9316302248e29a3dfa2f7f54

    SHA512

    ae64e6754c527c9b1d5aef80bb6cbe052a58d53c8d5ea673ee8c0e5d4b4f46c9b46a3a291ce1a5d7b34b8543d5ec56ec0691c04334b446a90682d6e59b4d11ea

  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    1.1MB

    MD5

    ec469be63c612226a5d98e14bb9848db

    SHA1

    f5c1c8e6797e16f412ea49e03a09b520c6472071

    SHA256

    8481809a10aa58dc05566f679d52d75715ca03375dd55bead197f010552d1a5a

    SHA512

    6564d7ed902e327042ffe2d997def9139cd3b72b2e8c3482021424eeadb69e18f1f6bee5cecc3dd32b7ddd28a9d3a4df686410cac53b283c0ed609b30d45e36b

  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    1.1MB

    MD5

    576dd1600820b2830097a78e62fb375d

    SHA1

    eb852a4ad09e187fe641b72a8b648250372b274e

    SHA256

    16e22b76d92a6bc1c58197a6de3a3248f7c2534344b1fc1391139def39a2e7c7

    SHA512

    bbe05948ab91378eed6ac748f48d9b310995f6552d7a0287d9ddb9f5d45a59a6344259e84ebddc2f5eeb3f295f8488e3254bc6cea1595c6340446bec4a84e977

  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    1.1MB

    MD5

    aba6017a213872a1276d23913e0321b5

    SHA1

    fdca2c36c8804cffc81477016ff1532c6928ccd8

    SHA256

    0281e3502b4efe8e2c05408250cbc5c2e345e3a1b1d30beed26b3d5fc39ee274

    SHA512

    2323a4b8a8a4090a25fe6b51955bcf3e20f9878315c103ffe56b252b2748902859babab61b81738dbcb136d32cf35c82dc66de67f1d8226b2b1a4e56b45e6f5d

  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    1.1MB

    MD5

    5a51c22317cb06852e1fe282db29f428

    SHA1

    7ced8ff57741fe81b1c567983d40347882b20789

    SHA256

    90f936f97dfc5b55dede1ea2274b70beb0a273676e0adb4ef0963b647793bf97

    SHA512

    a5c1c6f69293a8ba49a36f1e6ab8cca2be5eb825ed878716a6675ac63fe71387a2fd216e4112b40169c5945bce23e3ed1e423803d2b614aef2bedd1a5b9c801d

  • memory/1884-8-0x0000000000400000-0x0000000000551000-memory.dmp

    Filesize

    1.3MB