Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12-09-2024 15:11
Static task
static1
Behavioral task
behavioral1
Sample
d2fcd384dc21870405652958c1133e7b629e80a7e326d2892a82bf97c8300d5e.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d2fcd384dc21870405652958c1133e7b629e80a7e326d2892a82bf97c8300d5e.exe
Resource
win10v2004-20240802-en
General
-
Target
d2fcd384dc21870405652958c1133e7b629e80a7e326d2892a82bf97c8300d5e.exe
-
Size
1.1MB
-
MD5
c6819887ebfaf9a28fe67c0e3e392675
-
SHA1
ad0ee2d1c899a22f6f32988baed17f6085f31503
-
SHA256
d2fcd384dc21870405652958c1133e7b629e80a7e326d2892a82bf97c8300d5e
-
SHA512
a134b06c82dddd91e0d27a61fe1417d4f96342f01f187b76c07db5ab8e096262d87cadb678ac0f2cea04d70cf4476e0532efde1de0fae79b6ac9b22eb7ad7eef
-
SSDEEP
24576:CH0dl8myX9Bg42QoXFkrzkmmlSgRDko0lG4Z8r7Qfbkiu5Qb:CcaClSFlG4ZM7QzMs
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation d2fcd384dc21870405652958c1133e7b629e80a7e326d2892a82bf97c8300d5e.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation svchcst.exe -
Deletes itself 1 IoCs
pid Process 4032 svchcst.exe -
Executes dropped EXE 3 IoCs
pid Process 4032 svchcst.exe 4936 svchcst.exe 1164 svchcst.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d2fcd384dc21870405652958c1133e7b629e80a7e326d2892a82bf97c8300d5e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings d2fcd384dc21870405652958c1133e7b629e80a7e326d2892a82bf97c8300d5e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings svchcst.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3460 d2fcd384dc21870405652958c1133e7b629e80a7e326d2892a82bf97c8300d5e.exe 3460 d2fcd384dc21870405652958c1133e7b629e80a7e326d2892a82bf97c8300d5e.exe 4032 svchcst.exe 4032 svchcst.exe 4032 svchcst.exe 4032 svchcst.exe 4032 svchcst.exe 4032 svchcst.exe 4032 svchcst.exe 4032 svchcst.exe 4032 svchcst.exe 4032 svchcst.exe 4032 svchcst.exe 4032 svchcst.exe 4032 svchcst.exe 4032 svchcst.exe 4032 svchcst.exe 4032 svchcst.exe 4032 svchcst.exe 4032 svchcst.exe 4032 svchcst.exe 4032 svchcst.exe 4032 svchcst.exe 4032 svchcst.exe 4032 svchcst.exe 4032 svchcst.exe 4032 svchcst.exe 4032 svchcst.exe 4032 svchcst.exe 4032 svchcst.exe 4032 svchcst.exe 4032 svchcst.exe 4032 svchcst.exe 4032 svchcst.exe 4032 svchcst.exe 4032 svchcst.exe 4032 svchcst.exe 4032 svchcst.exe 4032 svchcst.exe 4032 svchcst.exe 4032 svchcst.exe 4032 svchcst.exe 4032 svchcst.exe 4032 svchcst.exe 4032 svchcst.exe 4032 svchcst.exe 4032 svchcst.exe 4032 svchcst.exe 4032 svchcst.exe 4032 svchcst.exe 4032 svchcst.exe 4032 svchcst.exe 4032 svchcst.exe 4032 svchcst.exe 4032 svchcst.exe 4032 svchcst.exe 4032 svchcst.exe 4032 svchcst.exe 4032 svchcst.exe 4032 svchcst.exe 4032 svchcst.exe 4032 svchcst.exe 4032 svchcst.exe 4032 svchcst.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3460 d2fcd384dc21870405652958c1133e7b629e80a7e326d2892a82bf97c8300d5e.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3460 d2fcd384dc21870405652958c1133e7b629e80a7e326d2892a82bf97c8300d5e.exe 3460 d2fcd384dc21870405652958c1133e7b629e80a7e326d2892a82bf97c8300d5e.exe 4032 svchcst.exe 4032 svchcst.exe 4936 svchcst.exe 4936 svchcst.exe 1164 svchcst.exe 1164 svchcst.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3460 wrote to memory of 4284 3460 d2fcd384dc21870405652958c1133e7b629e80a7e326d2892a82bf97c8300d5e.exe 86 PID 3460 wrote to memory of 4284 3460 d2fcd384dc21870405652958c1133e7b629e80a7e326d2892a82bf97c8300d5e.exe 86 PID 3460 wrote to memory of 4284 3460 d2fcd384dc21870405652958c1133e7b629e80a7e326d2892a82bf97c8300d5e.exe 86 PID 4284 wrote to memory of 4032 4284 WScript.exe 93 PID 4284 wrote to memory of 4032 4284 WScript.exe 93 PID 4284 wrote to memory of 4032 4284 WScript.exe 93 PID 4032 wrote to memory of 4920 4032 svchcst.exe 94 PID 4032 wrote to memory of 4920 4032 svchcst.exe 94 PID 4032 wrote to memory of 4920 4032 svchcst.exe 94 PID 4032 wrote to memory of 396 4032 svchcst.exe 95 PID 4032 wrote to memory of 396 4032 svchcst.exe 95 PID 4032 wrote to memory of 396 4032 svchcst.exe 95 PID 4920 wrote to memory of 4936 4920 WScript.exe 98 PID 4920 wrote to memory of 4936 4920 WScript.exe 98 PID 4920 wrote to memory of 4936 4920 WScript.exe 98 PID 396 wrote to memory of 1164 396 WScript.exe 99 PID 396 wrote to memory of 1164 396 WScript.exe 99 PID 396 wrote to memory of 1164 396 WScript.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\d2fcd384dc21870405652958c1133e7b629e80a7e326d2892a82bf97c8300d5e.exe"C:\Users\Admin\AppData\Local\Temp\d2fcd384dc21870405652958c1133e7b629e80a7e326d2892a82bf97c8300d5e.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4936
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1164
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92B
MD567b9b3e2ded7086f393ebbc36c5e7bca
SHA1e6299d0450b9a92a18cc23b5704a2b475652c790
SHA25644063c266686263f14cd2a83fee124fb3e61a9171a6aab69709464f49511011d
SHA512826fbc9481f46b1ae3db828a665c55c349023caf563e6e8c17321f5f3af3e4c3914955db6f0eebfc6defe561315435d47310b4d0499ab9c2c85bb61264dedc09
-
Filesize
753B
MD53e007f2d1f01ab038d8714c1008d79b0
SHA1aec7f3732303ec576e198ee6731b8519af13a32c
SHA256faacd96be15625511c1d27d27112bf5e2828475a9f3a568b9de6452a54ca0fe2
SHA512a5cba2cb4e1e2e03b16933faee70642118bc2d0da9b0e960a5427ba00a046785031b2519420f410179ebf7853345f8432f4b38bbce7dfe2a7f4e175f7006edf7
-
Filesize
696B
MD5072a46f071251f08c67b3aba4c983435
SHA1371837f885eac20c802901026d2e7aa1d4f6cd5c
SHA2560d0a8daeceed64600e817a5a0437a39048c52e857868a35d9130d42fdfa896ed
SHA512e3d35d428a29eec047b0cc43c87aa701eed81e9efe921b4ef13fa2e8e24ef11ce602bd67868b7ad1bdbd9f39eb681a8c95c715479238a2f17c17105ea4653c83
-
Filesize
1.1MB
MD5f57f68a3a817c752fcd21e488dd914c0
SHA1856161ed67f7df891de356e44f43a2d12dad1fab
SHA2569ad57beb92923f612febcb9f25e49d9d7400ae8b0d6b7533a58aedaa30e38e8e
SHA5123f5893f5ebb692b7e8f3a805d02012aace8df971a7ae6b0507b86d8df0fdee98c21d562db5325c30978e8f6f1b0a46511e5e808c4244076a3d4c715224dc2afa
-
Filesize
1.1MB
MD5e75bd2c635b6494f56c38027b6fd3b66
SHA16819ca77be8fdd2ba51b66fb7fd3979dd916c63c
SHA25649097c0fd4ecf20cac6028c94af5f9263e332dbe9a23cf428cc4f8bb8c53d233
SHA5129b747d9536c105ea04dd556d6aa0fd0cda59e178b203af5f6f00a9870e791ba240fbc4b2169047688a78b6fda1deefdfe424bafd435bcf9730d71dc6b9c3574b