Analysis
-
max time kernel
61s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-09-2024 23:10
Static task
static1
Behavioral task
behavioral1
Sample
b98cad0071022dc71e0b2229ea88556c377d9a02f9fd3b597ccc2cf8a936e302.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b98cad0071022dc71e0b2229ea88556c377d9a02f9fd3b597ccc2cf8a936e302.exe
Resource
win10v2004-20240802-en
General
-
Target
b98cad0071022dc71e0b2229ea88556c377d9a02f9fd3b597ccc2cf8a936e302.exe
-
Size
1.1MB
-
MD5
2750136f497f32bba6f49bfc8c22c17e
-
SHA1
a02560f4835ad515dd8ae906a36032e11ffa669f
-
SHA256
b98cad0071022dc71e0b2229ea88556c377d9a02f9fd3b597ccc2cf8a936e302
-
SHA512
304ed8aaa0c6bebc409ff99af6240dab2d33e3cd5c18acfe5b6cc36227b14136516cfa8fd299df9d3a8d0824c5762f5d13a61d84e756bce09cdcc929a3534d43
-
SSDEEP
24576:aH0dl8myX9Bg42QoXFkrzkmplSgRDYo0lG4Z8r7Qfbkiu5Q6:acallSllG4ZM7QzMZ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1128 svchcst.exe -
Executes dropped EXE 9 IoCs
pid Process 1128 svchcst.exe 2304 svchcst.exe 528 svchcst.exe 2016 svchcst.exe 2088 svchcst.exe 2068 svchcst.exe 2096 svchcst.exe 2812 svchcst.exe 2848 svchcst.exe -
Loads dropped DLL 10 IoCs
pid Process 2780 WScript.exe 2780 WScript.exe 1236 WScript.exe 1480 WScript.exe 1480 WScript.exe 2368 WScript.exe 2368 WScript.exe 1736 WScript.exe 1736 WScript.exe 2056 WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 19 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b98cad0071022dc71e0b2229ea88556c377d9a02f9fd3b597ccc2cf8a936e302.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1872 b98cad0071022dc71e0b2229ea88556c377d9a02f9fd3b597ccc2cf8a936e302.exe 1128 svchcst.exe 1128 svchcst.exe 1128 svchcst.exe 1128 svchcst.exe 1128 svchcst.exe 1128 svchcst.exe 1128 svchcst.exe 1128 svchcst.exe 1128 svchcst.exe 1128 svchcst.exe 1128 svchcst.exe 1128 svchcst.exe 1128 svchcst.exe 1128 svchcst.exe 1128 svchcst.exe 1128 svchcst.exe 1128 svchcst.exe 1128 svchcst.exe 1128 svchcst.exe 1128 svchcst.exe 1128 svchcst.exe 1128 svchcst.exe 1128 svchcst.exe 1128 svchcst.exe 1128 svchcst.exe 1128 svchcst.exe 1128 svchcst.exe 1128 svchcst.exe 1128 svchcst.exe 1128 svchcst.exe 1128 svchcst.exe 1128 svchcst.exe 1128 svchcst.exe 1128 svchcst.exe 1128 svchcst.exe 1128 svchcst.exe 1128 svchcst.exe 1128 svchcst.exe 1128 svchcst.exe 1128 svchcst.exe 1128 svchcst.exe 1128 svchcst.exe 1128 svchcst.exe 1128 svchcst.exe 1128 svchcst.exe 1128 svchcst.exe 1128 svchcst.exe 1128 svchcst.exe 1128 svchcst.exe 1128 svchcst.exe 1128 svchcst.exe 1128 svchcst.exe 1128 svchcst.exe 1128 svchcst.exe 1128 svchcst.exe 1128 svchcst.exe 1128 svchcst.exe 1128 svchcst.exe 1128 svchcst.exe 1128 svchcst.exe 1128 svchcst.exe 1128 svchcst.exe 1128 svchcst.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1872 b98cad0071022dc71e0b2229ea88556c377d9a02f9fd3b597ccc2cf8a936e302.exe -
Suspicious use of SetWindowsHookEx 20 IoCs
pid Process 1872 b98cad0071022dc71e0b2229ea88556c377d9a02f9fd3b597ccc2cf8a936e302.exe 1872 b98cad0071022dc71e0b2229ea88556c377d9a02f9fd3b597ccc2cf8a936e302.exe 1128 svchcst.exe 1128 svchcst.exe 2304 svchcst.exe 2304 svchcst.exe 528 svchcst.exe 528 svchcst.exe 2016 svchcst.exe 2016 svchcst.exe 2088 svchcst.exe 2088 svchcst.exe 2068 svchcst.exe 2068 svchcst.exe 2096 svchcst.exe 2096 svchcst.exe 2812 svchcst.exe 2812 svchcst.exe 2848 svchcst.exe 2848 svchcst.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1872 wrote to memory of 2780 1872 b98cad0071022dc71e0b2229ea88556c377d9a02f9fd3b597ccc2cf8a936e302.exe 30 PID 1872 wrote to memory of 2780 1872 b98cad0071022dc71e0b2229ea88556c377d9a02f9fd3b597ccc2cf8a936e302.exe 30 PID 1872 wrote to memory of 2780 1872 b98cad0071022dc71e0b2229ea88556c377d9a02f9fd3b597ccc2cf8a936e302.exe 30 PID 1872 wrote to memory of 2780 1872 b98cad0071022dc71e0b2229ea88556c377d9a02f9fd3b597ccc2cf8a936e302.exe 30 PID 2780 wrote to memory of 1128 2780 WScript.exe 32 PID 2780 wrote to memory of 1128 2780 WScript.exe 32 PID 2780 wrote to memory of 1128 2780 WScript.exe 32 PID 2780 wrote to memory of 1128 2780 WScript.exe 32 PID 1128 wrote to memory of 1620 1128 svchcst.exe 33 PID 1128 wrote to memory of 1620 1128 svchcst.exe 33 PID 1128 wrote to memory of 1620 1128 svchcst.exe 33 PID 1128 wrote to memory of 1620 1128 svchcst.exe 33 PID 1128 wrote to memory of 1236 1128 svchcst.exe 34 PID 1128 wrote to memory of 1236 1128 svchcst.exe 34 PID 1128 wrote to memory of 1236 1128 svchcst.exe 34 PID 1128 wrote to memory of 1236 1128 svchcst.exe 34 PID 1236 wrote to memory of 2304 1236 WScript.exe 35 PID 1236 wrote to memory of 2304 1236 WScript.exe 35 PID 1236 wrote to memory of 2304 1236 WScript.exe 35 PID 1236 wrote to memory of 2304 1236 WScript.exe 35 PID 2304 wrote to memory of 1480 2304 svchcst.exe 36 PID 2304 wrote to memory of 1480 2304 svchcst.exe 36 PID 2304 wrote to memory of 1480 2304 svchcst.exe 36 PID 2304 wrote to memory of 1480 2304 svchcst.exe 36 PID 1480 wrote to memory of 528 1480 WScript.exe 37 PID 1480 wrote to memory of 528 1480 WScript.exe 37 PID 1480 wrote to memory of 528 1480 WScript.exe 37 PID 1480 wrote to memory of 528 1480 WScript.exe 37 PID 528 wrote to memory of 2028 528 svchcst.exe 38 PID 528 wrote to memory of 2028 528 svchcst.exe 38 PID 528 wrote to memory of 2028 528 svchcst.exe 38 PID 528 wrote to memory of 2028 528 svchcst.exe 38 PID 1480 wrote to memory of 2016 1480 WScript.exe 39 PID 1480 wrote to memory of 2016 1480 WScript.exe 39 PID 1480 wrote to memory of 2016 1480 WScript.exe 39 PID 1480 wrote to memory of 2016 1480 WScript.exe 39 PID 2016 wrote to memory of 2368 2016 svchcst.exe 40 PID 2016 wrote to memory of 2368 2016 svchcst.exe 40 PID 2016 wrote to memory of 2368 2016 svchcst.exe 40 PID 2016 wrote to memory of 2368 2016 svchcst.exe 40 PID 2368 wrote to memory of 2088 2368 WScript.exe 41 PID 2368 wrote to memory of 2088 2368 WScript.exe 41 PID 2368 wrote to memory of 2088 2368 WScript.exe 41 PID 2368 wrote to memory of 2088 2368 WScript.exe 41 PID 2088 wrote to memory of 840 2088 svchcst.exe 42 PID 2088 wrote to memory of 840 2088 svchcst.exe 42 PID 2088 wrote to memory of 840 2088 svchcst.exe 42 PID 2088 wrote to memory of 840 2088 svchcst.exe 42 PID 2368 wrote to memory of 2068 2368 WScript.exe 43 PID 2368 wrote to memory of 2068 2368 WScript.exe 43 PID 2368 wrote to memory of 2068 2368 WScript.exe 43 PID 2368 wrote to memory of 2068 2368 WScript.exe 43 PID 2068 wrote to memory of 1736 2068 svchcst.exe 44 PID 2068 wrote to memory of 1736 2068 svchcst.exe 44 PID 2068 wrote to memory of 1736 2068 svchcst.exe 44 PID 2068 wrote to memory of 1736 2068 svchcst.exe 44 PID 1736 wrote to memory of 2096 1736 WScript.exe 45 PID 1736 wrote to memory of 2096 1736 WScript.exe 45 PID 1736 wrote to memory of 2096 1736 WScript.exe 45 PID 1736 wrote to memory of 2096 1736 WScript.exe 45 PID 2096 wrote to memory of 2056 2096 svchcst.exe 46 PID 2096 wrote to memory of 2056 2096 svchcst.exe 46 PID 2096 wrote to memory of 2056 2096 svchcst.exe 46 PID 2096 wrote to memory of 2056 2096 svchcst.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\b98cad0071022dc71e0b2229ea88556c377d9a02f9fd3b597ccc2cf8a936e302.exe"C:\Users\Admin\AppData\Local\Temp\b98cad0071022dc71e0b2229ea88556c377d9a02f9fd3b597ccc2cf8a936e302.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"4⤵
- System Location Discovery: System Language Discovery
PID:1620
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"6⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"8⤵
- System Location Discovery: System Language Discovery
PID:2028
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"8⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"10⤵
- System Location Discovery: System Language Discovery
PID:840
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"10⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"11⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"12⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2056 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2848
-
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"11⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2812
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92B
MD567b9b3e2ded7086f393ebbc36c5e7bca
SHA1e6299d0450b9a92a18cc23b5704a2b475652c790
SHA25644063c266686263f14cd2a83fee124fb3e61a9171a6aab69709464f49511011d
SHA512826fbc9481f46b1ae3db828a665c55c349023caf563e6e8c17321f5f3af3e4c3914955db6f0eebfc6defe561315435d47310b4d0499ab9c2c85bb61264dedc09
-
Filesize
696B
MD5f9749c13b20bc60748c3f72c2cf20740
SHA1227698fcf7919e5c66d91e4e0fd51a5d54ffcd6e
SHA2562ea51d4fb5a6022d3cf66550189fa271c025d8fabd55cc24025d12e600b70594
SHA512541c5d5e8187257adb03505430c87bd364bec53487b373ecf4f91aee21dcecc746a4855ca0ee72fbfddcf34e52fe2453770ae66183b308d6b45a0f37342e44d8
-
Filesize
753B
MD54c5b83bdddc17c8ecbd8463c152ec5d0
SHA1d02b184d6207600a586c364900375decc39dd243
SHA2568c5dae7241708da5a6dc50fc86f70fbb12943c9addb524552d719885e5f7e537
SHA51209b9483e7a420bdabd7d9bd12d38506932525d92065007d7d9a6f199daa609869140bc77b93b36bbe3734071f605c2f7bd84125e87baf8def53875ba014058c0
-
Filesize
696B
MD5dabf4e9d32908d961aaffdd1c77d4879
SHA1e41572d98b7452016fb004c843236377364ab1d3
SHA2563488c64a6d2da3c00e50e954c495ac354ee504e54f3ed6dda6a991c5b9d33e19
SHA512911d46aca8005857c86eddbb3cbbc4301ee5e173b2358a717053cf12727c06cc3b2d757ddf513f969dafe61c6b88d03b1478d8c483495f153e30bf64585195aa
-
Filesize
696B
MD56d7f7c489889b75561316023d3e8b801
SHA1222906d8a273e49d99b9107d388856ba8e6a5400
SHA2563c01dd72d85883db4a345c0092b799f8deb31d43fde226e7df011c64d95202a7
SHA5127238e65f9b93ee3be8828f01b54fbb6acaeaaf31e2b62af398356b02fa80d615acc3f41139fb001b9c1e8855e5cfa467f2883acda663a08194955cadb409a24a
-
Filesize
696B
MD53353d1633bca569636039038a518d927
SHA1780e7b0504ce0c3eb7a2d5ab9cc18b9d0596bd34
SHA2566f9daffcca457b49869f9b22fe00e63b4c232c9e13998ab908b91909aa446b8d
SHA51266a8b0877d6c6f196b85b4e8bf7d67da20fd3749543d65b54599233fc68f476445e70f9ad8e54cb3a71676c6b8a51957f11df2442883f1283c6d526884ec0c18
-
Filesize
696B
MD5297aff64991480fd92a4ce9fb4d40807
SHA1c586f7003f854f442db26448516e59826dfe41e9
SHA2565137a62e031c71093a7d6c2684519614bb5eed80fd8daa92912f085a6ab82b8a
SHA512f7a2fae80f26e6fb846ec9675c5a03932c8bd842d75f68cdb05c2f18e9397ed32774ce0a1f495e5618a5ce1b37e088c8991a69fb999559d1e2b0dd360cc96b4f
-
Filesize
696B
MD598328aa8ad181fbf0b87edfc21155dce
SHA13ca100ca64d5f62a5dceef47f414c0953fd4f559
SHA256a6928cf27564f6f983d8f62358463a2dee471715b220de03db8b72ebf105f20c
SHA51275f298c982eeebf184fdd0612436583a863beba740bd55053539dc1b1c20103a1c6f5da46b41621eb00d601cdfc86c1705080a0da08fef7756637805dcb588ec
-
Filesize
696B
MD5aa6578debd9e5045ad239d59ebeb6d15
SHA12a25e6293914cd6ada6649f34506c8bcf35494aa
SHA2567acb095ca5298eb1d1e2ba7f02c1b876d7d28684762a9d180ae2ed8c9e68beb2
SHA512150796c7aad73d1732103e41bd01d3c181b4a0afd37b673d184d5c6c643622704e7692b668e231a319549c2bb378f4d83c7ede82caf81dd15c934b81936e22b2
-
Filesize
1.1MB
MD534fc915dcc0993e610cf7a2a50635e64
SHA113fd43da93cd090be787aed7332e9e61d9f374dc
SHA2567eed261a04a70d87e0c29203d6b08037490865e5c93b6054aa97a0889f4be03a
SHA512309277bb05a52200571f4457425dd48278dc51f30557b87f96cc1307564870ead4009512c905582668a7d7385c4f3d3f81af3e5eedf513cebb1c5915a1bfa046