Analysis
-
max time kernel
95s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/09/2024, 17:58
Static task
static1
Behavioral task
behavioral1
Sample
fafa87728d1d80d72690d34614031adb0a76af857fadd7ae221d87df4f1bb59c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fafa87728d1d80d72690d34614031adb0a76af857fadd7ae221d87df4f1bb59c.exe
Resource
win10v2004-20240802-en
General
-
Target
fafa87728d1d80d72690d34614031adb0a76af857fadd7ae221d87df4f1bb59c.exe
-
Size
1.1MB
-
MD5
5d0513cc6c66da67a62c8b3d6532ae88
-
SHA1
b659e3729c85bc71ba9a0412c5ebf27d4a235cac
-
SHA256
fafa87728d1d80d72690d34614031adb0a76af857fadd7ae221d87df4f1bb59c
-
SHA512
4e08dcb89e6fa015da9888a749620076e914e73f426f607d6360e1571a0f6723b1b443ee232cfcc3db84e6ef10f2a4ccaa94b82b91b5c3232cb559fc5a375180
-
SSDEEP
24576:CH0dl8myX9Bg42QoXFkrzkmmlSgRDko0lG4Z8r7Qfbkiu5Q/:CcaClSFlG4ZM7QzM4
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation fafa87728d1d80d72690d34614031adb0a76af857fadd7ae221d87df4f1bb59c.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation WScript.exe -
Deletes itself 1 IoCs
pid Process 3112 svchcst.exe -
Executes dropped EXE 2 IoCs
pid Process 3112 svchcst.exe 3484 svchcst.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fafa87728d1d80d72690d34614031adb0a76af857fadd7ae221d87df4f1bb59c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings fafa87728d1d80d72690d34614031adb0a76af857fadd7ae221d87df4f1bb59c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4436 fafa87728d1d80d72690d34614031adb0a76af857fadd7ae221d87df4f1bb59c.exe 4436 fafa87728d1d80d72690d34614031adb0a76af857fadd7ae221d87df4f1bb59c.exe 4436 fafa87728d1d80d72690d34614031adb0a76af857fadd7ae221d87df4f1bb59c.exe 4436 fafa87728d1d80d72690d34614031adb0a76af857fadd7ae221d87df4f1bb59c.exe 3112 svchcst.exe 3112 svchcst.exe 3112 svchcst.exe 3112 svchcst.exe 3112 svchcst.exe 3112 svchcst.exe 3112 svchcst.exe 3112 svchcst.exe 3112 svchcst.exe 3112 svchcst.exe 3112 svchcst.exe 3112 svchcst.exe 3112 svchcst.exe 3112 svchcst.exe 3112 svchcst.exe 3112 svchcst.exe 3112 svchcst.exe 3112 svchcst.exe 3112 svchcst.exe 3112 svchcst.exe 3112 svchcst.exe 3112 svchcst.exe 3112 svchcst.exe 3112 svchcst.exe 3112 svchcst.exe 3112 svchcst.exe 3112 svchcst.exe 3112 svchcst.exe 3112 svchcst.exe 3112 svchcst.exe 3112 svchcst.exe 3112 svchcst.exe 3112 svchcst.exe 3112 svchcst.exe 3112 svchcst.exe 3112 svchcst.exe 3112 svchcst.exe 3112 svchcst.exe 3112 svchcst.exe 3112 svchcst.exe 3112 svchcst.exe 3112 svchcst.exe 3112 svchcst.exe 3112 svchcst.exe 3112 svchcst.exe 3112 svchcst.exe 3112 svchcst.exe 3112 svchcst.exe 3112 svchcst.exe 3112 svchcst.exe 3112 svchcst.exe 3112 svchcst.exe 3112 svchcst.exe 3112 svchcst.exe 3112 svchcst.exe 3112 svchcst.exe 3112 svchcst.exe 3112 svchcst.exe 3112 svchcst.exe 3112 svchcst.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4436 fafa87728d1d80d72690d34614031adb0a76af857fadd7ae221d87df4f1bb59c.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4436 fafa87728d1d80d72690d34614031adb0a76af857fadd7ae221d87df4f1bb59c.exe 4436 fafa87728d1d80d72690d34614031adb0a76af857fadd7ae221d87df4f1bb59c.exe 3112 svchcst.exe 3112 svchcst.exe 3484 svchcst.exe 3484 svchcst.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4436 wrote to memory of 1032 4436 fafa87728d1d80d72690d34614031adb0a76af857fadd7ae221d87df4f1bb59c.exe 86 PID 4436 wrote to memory of 1032 4436 fafa87728d1d80d72690d34614031adb0a76af857fadd7ae221d87df4f1bb59c.exe 86 PID 4436 wrote to memory of 1032 4436 fafa87728d1d80d72690d34614031adb0a76af857fadd7ae221d87df4f1bb59c.exe 86 PID 4436 wrote to memory of 2552 4436 fafa87728d1d80d72690d34614031adb0a76af857fadd7ae221d87df4f1bb59c.exe 87 PID 4436 wrote to memory of 2552 4436 fafa87728d1d80d72690d34614031adb0a76af857fadd7ae221d87df4f1bb59c.exe 87 PID 4436 wrote to memory of 2552 4436 fafa87728d1d80d72690d34614031adb0a76af857fadd7ae221d87df4f1bb59c.exe 87 PID 2552 wrote to memory of 3112 2552 WScript.exe 93 PID 2552 wrote to memory of 3112 2552 WScript.exe 93 PID 2552 wrote to memory of 3112 2552 WScript.exe 93 PID 1032 wrote to memory of 3484 1032 WScript.exe 94 PID 1032 wrote to memory of 3484 1032 WScript.exe 94 PID 1032 wrote to memory of 3484 1032 WScript.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\fafa87728d1d80d72690d34614031adb0a76af857fadd7ae221d87df4f1bb59c.exe"C:\Users\Admin\AppData\Local\Temp\fafa87728d1d80d72690d34614031adb0a76af857fadd7ae221d87df4f1bb59c.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3484
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3112
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
753B
MD58e67d4e33c51c7fed3b3b8add3efc042
SHA1ba64f34357648aece5d048aa99a9242d7e88c5d2
SHA2564530bd8b18a0d622c7992339f2cb464a96a1159184484fb8232d37a053799ab0
SHA512ef0d2a9873d376c3e647a983faa6625fdcb406b27b5d2841bfc55cae9c597e2d5aab7c1c725dfc9509d230c5735e61ba460cb4206ba15b1c5887c76e0b355272
-
Filesize
1.1MB
MD5c430d1191ccb01a2201cbb7065c33cd9
SHA1385e40fd18501fac48502ed935690d7378ed660d
SHA2569b32f31bf356a9c825375d6380066b761a7141b5be11399d871a0aec2aef134c
SHA512091cf2cf747b4535e1cd980026c71d38fe5a4072b0d9dbefa95f59a462e98702042a3a4d56cb8ce4bc71f3467635c26a9c05479ff7bf49246cc1a7cbb62d58b7