Analysis
-
max time kernel
95s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/09/2024, 21:02
Static task
static1
Behavioral task
behavioral1
Sample
dd740532d35e0ab734f64ca3e4c5e05dcec20d812c1a9a586a69b020a03b68fd.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
dd740532d35e0ab734f64ca3e4c5e05dcec20d812c1a9a586a69b020a03b68fd.exe
Resource
win10v2004-20240802-en
General
-
Target
dd740532d35e0ab734f64ca3e4c5e05dcec20d812c1a9a586a69b020a03b68fd.exe
-
Size
1.1MB
-
MD5
1f03eea7e91a792018d4a2e1a8ce9f06
-
SHA1
637711dfb13335289bff91c3dfc7250eaecc77b9
-
SHA256
dd740532d35e0ab734f64ca3e4c5e05dcec20d812c1a9a586a69b020a03b68fd
-
SHA512
9b830a4f2c9c2a37b2da7425e41fd0fd3739a069942c3c8fd551c6f6f33c024e36167961b6cf477aa01b766b86d888f49469f480c342bb8092b414c051d3adc0
-
SSDEEP
24576:CH0dl8myX9Bg42QoXFkrzkmmlSgRDko0lG4Z8r7Qfbkiu5QA:CcaClSFlG4ZM7QzM3
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation dd740532d35e0ab734f64ca3e4c5e05dcec20d812c1a9a586a69b020a03b68fd.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation WScript.exe -
Deletes itself 1 IoCs
pid Process 3948 svchcst.exe -
Executes dropped EXE 2 IoCs
pid Process 3948 svchcst.exe 1016 svchcst.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dd740532d35e0ab734f64ca3e4c5e05dcec20d812c1a9a586a69b020a03b68fd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings dd740532d35e0ab734f64ca3e4c5e05dcec20d812c1a9a586a69b020a03b68fd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3736 dd740532d35e0ab734f64ca3e4c5e05dcec20d812c1a9a586a69b020a03b68fd.exe 3736 dd740532d35e0ab734f64ca3e4c5e05dcec20d812c1a9a586a69b020a03b68fd.exe 3736 dd740532d35e0ab734f64ca3e4c5e05dcec20d812c1a9a586a69b020a03b68fd.exe 3736 dd740532d35e0ab734f64ca3e4c5e05dcec20d812c1a9a586a69b020a03b68fd.exe 3948 svchcst.exe 3948 svchcst.exe 3948 svchcst.exe 3948 svchcst.exe 3948 svchcst.exe 3948 svchcst.exe 3948 svchcst.exe 3948 svchcst.exe 3948 svchcst.exe 3948 svchcst.exe 3948 svchcst.exe 3948 svchcst.exe 3948 svchcst.exe 3948 svchcst.exe 3948 svchcst.exe 3948 svchcst.exe 3948 svchcst.exe 3948 svchcst.exe 3948 svchcst.exe 3948 svchcst.exe 3948 svchcst.exe 3948 svchcst.exe 3948 svchcst.exe 3948 svchcst.exe 3948 svchcst.exe 3948 svchcst.exe 3948 svchcst.exe 3948 svchcst.exe 3948 svchcst.exe 3948 svchcst.exe 3948 svchcst.exe 3948 svchcst.exe 3948 svchcst.exe 3948 svchcst.exe 3948 svchcst.exe 3948 svchcst.exe 3948 svchcst.exe 3948 svchcst.exe 3948 svchcst.exe 3948 svchcst.exe 3948 svchcst.exe 3948 svchcst.exe 3948 svchcst.exe 3948 svchcst.exe 3948 svchcst.exe 3948 svchcst.exe 3948 svchcst.exe 3948 svchcst.exe 3948 svchcst.exe 3948 svchcst.exe 3948 svchcst.exe 3948 svchcst.exe 3948 svchcst.exe 3948 svchcst.exe 3948 svchcst.exe 3948 svchcst.exe 3948 svchcst.exe 3948 svchcst.exe 3948 svchcst.exe 3948 svchcst.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3736 dd740532d35e0ab734f64ca3e4c5e05dcec20d812c1a9a586a69b020a03b68fd.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3736 dd740532d35e0ab734f64ca3e4c5e05dcec20d812c1a9a586a69b020a03b68fd.exe 3736 dd740532d35e0ab734f64ca3e4c5e05dcec20d812c1a9a586a69b020a03b68fd.exe 3948 svchcst.exe 3948 svchcst.exe 1016 svchcst.exe 1016 svchcst.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3736 wrote to memory of 3608 3736 dd740532d35e0ab734f64ca3e4c5e05dcec20d812c1a9a586a69b020a03b68fd.exe 87 PID 3736 wrote to memory of 3608 3736 dd740532d35e0ab734f64ca3e4c5e05dcec20d812c1a9a586a69b020a03b68fd.exe 87 PID 3736 wrote to memory of 3608 3736 dd740532d35e0ab734f64ca3e4c5e05dcec20d812c1a9a586a69b020a03b68fd.exe 87 PID 3736 wrote to memory of 3524 3736 dd740532d35e0ab734f64ca3e4c5e05dcec20d812c1a9a586a69b020a03b68fd.exe 86 PID 3736 wrote to memory of 3524 3736 dd740532d35e0ab734f64ca3e4c5e05dcec20d812c1a9a586a69b020a03b68fd.exe 86 PID 3736 wrote to memory of 3524 3736 dd740532d35e0ab734f64ca3e4c5e05dcec20d812c1a9a586a69b020a03b68fd.exe 86 PID 3608 wrote to memory of 3948 3608 WScript.exe 94 PID 3608 wrote to memory of 3948 3608 WScript.exe 94 PID 3608 wrote to memory of 3948 3608 WScript.exe 94 PID 3524 wrote to memory of 1016 3524 WScript.exe 93 PID 3524 wrote to memory of 1016 3524 WScript.exe 93 PID 3524 wrote to memory of 1016 3524 WScript.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\dd740532d35e0ab734f64ca3e4c5e05dcec20d812c1a9a586a69b020a03b68fd.exe"C:\Users\Admin\AppData\Local\Temp\dd740532d35e0ab734f64ca3e4c5e05dcec20d812c1a9a586a69b020a03b68fd.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1016
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3948
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
753B
MD5736e8b8e47e70587f716c8583efc3606
SHA19997b290010603d488b72656a692c1a393781c8a
SHA256126b629219ac76e8ba5c9a84cfa491cd43db45db42e925dad093feb61a8b7bb7
SHA512e68f27b123b516be28824f2fae96fbccd0d3cc3d6cabdd2dc6bd6dd8c1d056570afe66cf446c113009f1f30a906a1009df9cecebc905fe9b43c87f1314fa5392
-
Filesize
1.1MB
MD59143afb0f6d457f2abade6529f2c8647
SHA13e7ece243acaf2dbf4f113aeb04306c788fdb7bb
SHA25692cbbd695ae8eb38083f0f1e01d2dacdae36c719b919bcb1b295b25764ef6e44
SHA512efcc9b89f0cae867c261960d4d2f1320bf43e194bebcd58d2277ba1e1e19a13d0a0349cda026105ece58579e7d4c18d906b370f15343914d35c6fe4677e7a613