Analysis
-
max time kernel
96s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13-09-2024 19:55
Static task
static1
Behavioral task
behavioral1
Sample
0c65fded3bcb7fcccbad3371d0d2a984d08aa727fd922c2eb4b9faad9bcdb0f7.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0c65fded3bcb7fcccbad3371d0d2a984d08aa727fd922c2eb4b9faad9bcdb0f7.exe
Resource
win10v2004-20240802-en
General
-
Target
0c65fded3bcb7fcccbad3371d0d2a984d08aa727fd922c2eb4b9faad9bcdb0f7.exe
-
Size
1.1MB
-
MD5
b0f1b4f9ea9ac79ac795e3bd326c47f7
-
SHA1
b5bcc3501f103fe2f44704f4ea42e4c0992db3a1
-
SHA256
0c65fded3bcb7fcccbad3371d0d2a984d08aa727fd922c2eb4b9faad9bcdb0f7
-
SHA512
d051156c28f2065b36b5aff0007739f72e1e8e972040cdc62188b80e4e6fbb41eda5585d2bb6a808aaabeac9d06dd5302e00358731141526a1e783d603f47201
-
SSDEEP
24576:CH0dl8myX9Bg42QoXFkrzkmmlSgRDko0lG4Z8r7Qfbkiu5Qb:CcaClSFlG4ZM7QzMc
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation 0c65fded3bcb7fcccbad3371d0d2a984d08aa727fd922c2eb4b9faad9bcdb0f7.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation WScript.exe -
Deletes itself 1 IoCs
pid Process 4456 svchcst.exe -
Executes dropped EXE 2 IoCs
pid Process 4076 svchcst.exe 4456 svchcst.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0c65fded3bcb7fcccbad3371d0d2a984d08aa727fd922c2eb4b9faad9bcdb0f7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings 0c65fded3bcb7fcccbad3371d0d2a984d08aa727fd922c2eb4b9faad9bcdb0f7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 452 0c65fded3bcb7fcccbad3371d0d2a984d08aa727fd922c2eb4b9faad9bcdb0f7.exe 452 0c65fded3bcb7fcccbad3371d0d2a984d08aa727fd922c2eb4b9faad9bcdb0f7.exe 452 0c65fded3bcb7fcccbad3371d0d2a984d08aa727fd922c2eb4b9faad9bcdb0f7.exe 452 0c65fded3bcb7fcccbad3371d0d2a984d08aa727fd922c2eb4b9faad9bcdb0f7.exe 4456 svchcst.exe 4456 svchcst.exe 4456 svchcst.exe 4456 svchcst.exe 4456 svchcst.exe 4456 svchcst.exe 4456 svchcst.exe 4456 svchcst.exe 4456 svchcst.exe 4456 svchcst.exe 4456 svchcst.exe 4456 svchcst.exe 4456 svchcst.exe 4456 svchcst.exe 4456 svchcst.exe 4456 svchcst.exe 4456 svchcst.exe 4456 svchcst.exe 4456 svchcst.exe 4456 svchcst.exe 4456 svchcst.exe 4456 svchcst.exe 4456 svchcst.exe 4456 svchcst.exe 4456 svchcst.exe 4456 svchcst.exe 4456 svchcst.exe 4456 svchcst.exe 4456 svchcst.exe 4456 svchcst.exe 4456 svchcst.exe 4456 svchcst.exe 4456 svchcst.exe 4456 svchcst.exe 4456 svchcst.exe 4456 svchcst.exe 4456 svchcst.exe 4456 svchcst.exe 4456 svchcst.exe 4456 svchcst.exe 4456 svchcst.exe 4456 svchcst.exe 4456 svchcst.exe 4456 svchcst.exe 4456 svchcst.exe 4456 svchcst.exe 4456 svchcst.exe 4456 svchcst.exe 4456 svchcst.exe 4456 svchcst.exe 4456 svchcst.exe 4456 svchcst.exe 4456 svchcst.exe 4456 svchcst.exe 4456 svchcst.exe 4456 svchcst.exe 4456 svchcst.exe 4456 svchcst.exe 4456 svchcst.exe 4456 svchcst.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 452 0c65fded3bcb7fcccbad3371d0d2a984d08aa727fd922c2eb4b9faad9bcdb0f7.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 452 0c65fded3bcb7fcccbad3371d0d2a984d08aa727fd922c2eb4b9faad9bcdb0f7.exe 452 0c65fded3bcb7fcccbad3371d0d2a984d08aa727fd922c2eb4b9faad9bcdb0f7.exe 4456 svchcst.exe 4456 svchcst.exe 4076 svchcst.exe 4076 svchcst.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 452 wrote to memory of 4156 452 0c65fded3bcb7fcccbad3371d0d2a984d08aa727fd922c2eb4b9faad9bcdb0f7.exe 86 PID 452 wrote to memory of 4156 452 0c65fded3bcb7fcccbad3371d0d2a984d08aa727fd922c2eb4b9faad9bcdb0f7.exe 86 PID 452 wrote to memory of 4156 452 0c65fded3bcb7fcccbad3371d0d2a984d08aa727fd922c2eb4b9faad9bcdb0f7.exe 86 PID 452 wrote to memory of 3508 452 0c65fded3bcb7fcccbad3371d0d2a984d08aa727fd922c2eb4b9faad9bcdb0f7.exe 87 PID 452 wrote to memory of 3508 452 0c65fded3bcb7fcccbad3371d0d2a984d08aa727fd922c2eb4b9faad9bcdb0f7.exe 87 PID 452 wrote to memory of 3508 452 0c65fded3bcb7fcccbad3371d0d2a984d08aa727fd922c2eb4b9faad9bcdb0f7.exe 87 PID 4156 wrote to memory of 4076 4156 WScript.exe 94 PID 4156 wrote to memory of 4076 4156 WScript.exe 94 PID 4156 wrote to memory of 4076 4156 WScript.exe 94 PID 3508 wrote to memory of 4456 3508 WScript.exe 93 PID 3508 wrote to memory of 4456 3508 WScript.exe 93 PID 3508 wrote to memory of 4456 3508 WScript.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c65fded3bcb7fcccbad3371d0d2a984d08aa727fd922c2eb4b9faad9bcdb0f7.exe"C:\Users\Admin\AppData\Local\Temp\0c65fded3bcb7fcccbad3371d0d2a984d08aa727fd922c2eb4b9faad9bcdb0f7.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4076
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4456
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
753B
MD5926cb18c0dcb9907440f313d39b3da08
SHA1d58ccfb0f0d930b9f8127b5b80d4ce860454a182
SHA256b8fae44441313cd7bfcc3fadf1a36fe0b0cb3df616f18c099fc56bcfb658521f
SHA51231012c2a8f04e7a82184176757721fbb154e23736c8bb9aea1e69aa867f794a5a53b5869eda3d022752e2caf4dc58958a84642ed8c3429be99f90fd6ddd78bb7
-
Filesize
1.1MB
MD505733f9e42c97f1924681981671435e3
SHA1ba9ccadf81f55a6238b9cc2ef866c3ff22529106
SHA256a606ec747c82cf9bef9675f64a1388b5348fa095bbe1d19ee87888469b9a573b
SHA512a571d4f857ba6c56a0a5429e7fbc409e92b8f7405b8f7dc84d4adc2bb0b1ec491dfcd02781465b075b5a5236f5f59ee8d57dc8dc34a763a881a5dbd8342d97b4