Analysis
-
max time kernel
131s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/09/2024, 21:27
Static task
static1
Behavioral task
behavioral1
Sample
cbad60cad73dce60051ddfa91506c8f760de8c353658e8d13a548a9913fe5fcb.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cbad60cad73dce60051ddfa91506c8f760de8c353658e8d13a548a9913fe5fcb.exe
Resource
win10v2004-20240802-en
General
-
Target
cbad60cad73dce60051ddfa91506c8f760de8c353658e8d13a548a9913fe5fcb.exe
-
Size
1.1MB
-
MD5
b2b1b4e832430b0add5c9e54f0584277
-
SHA1
2ffb755079b573644d5f78ab50e5dd04bf5611de
-
SHA256
cbad60cad73dce60051ddfa91506c8f760de8c353658e8d13a548a9913fe5fcb
-
SHA512
36f30eb084cd6df78720ee7c6dc18ff273f01df7db694c98c7a5e6dd67b75ccc29550f30a8e08f4baf2f0fca2dae7e9c6600a41cd7d50c833eeaf25691beb660
-
SSDEEP
24576:CH0dl8myX9Bg42QoXFkrzkmmlSgRDko0lG4Z8r7Qfbkiu5Qt:CcaClSFlG4ZM7QzMm
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation cbad60cad73dce60051ddfa91506c8f760de8c353658e8d13a548a9913fe5fcb.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation WScript.exe -
Deletes itself 1 IoCs
pid Process 5028 svchcst.exe -
Executes dropped EXE 2 IoCs
pid Process 5028 svchcst.exe 4988 svchcst.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cbad60cad73dce60051ddfa91506c8f760de8c353658e8d13a548a9913fe5fcb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings cbad60cad73dce60051ddfa91506c8f760de8c353658e8d13a548a9913fe5fcb.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4664 cbad60cad73dce60051ddfa91506c8f760de8c353658e8d13a548a9913fe5fcb.exe 4664 cbad60cad73dce60051ddfa91506c8f760de8c353658e8d13a548a9913fe5fcb.exe 4664 cbad60cad73dce60051ddfa91506c8f760de8c353658e8d13a548a9913fe5fcb.exe 4664 cbad60cad73dce60051ddfa91506c8f760de8c353658e8d13a548a9913fe5fcb.exe 5028 svchcst.exe 5028 svchcst.exe 5028 svchcst.exe 5028 svchcst.exe 5028 svchcst.exe 5028 svchcst.exe 5028 svchcst.exe 5028 svchcst.exe 5028 svchcst.exe 5028 svchcst.exe 5028 svchcst.exe 5028 svchcst.exe 5028 svchcst.exe 5028 svchcst.exe 5028 svchcst.exe 5028 svchcst.exe 5028 svchcst.exe 5028 svchcst.exe 5028 svchcst.exe 5028 svchcst.exe 5028 svchcst.exe 5028 svchcst.exe 5028 svchcst.exe 5028 svchcst.exe 5028 svchcst.exe 5028 svchcst.exe 5028 svchcst.exe 5028 svchcst.exe 5028 svchcst.exe 5028 svchcst.exe 5028 svchcst.exe 5028 svchcst.exe 5028 svchcst.exe 5028 svchcst.exe 5028 svchcst.exe 5028 svchcst.exe 5028 svchcst.exe 5028 svchcst.exe 5028 svchcst.exe 5028 svchcst.exe 5028 svchcst.exe 5028 svchcst.exe 5028 svchcst.exe 5028 svchcst.exe 5028 svchcst.exe 5028 svchcst.exe 5028 svchcst.exe 5028 svchcst.exe 5028 svchcst.exe 5028 svchcst.exe 5028 svchcst.exe 5028 svchcst.exe 5028 svchcst.exe 5028 svchcst.exe 5028 svchcst.exe 5028 svchcst.exe 5028 svchcst.exe 5028 svchcst.exe 5028 svchcst.exe 5028 svchcst.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4664 cbad60cad73dce60051ddfa91506c8f760de8c353658e8d13a548a9913fe5fcb.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4664 cbad60cad73dce60051ddfa91506c8f760de8c353658e8d13a548a9913fe5fcb.exe 4664 cbad60cad73dce60051ddfa91506c8f760de8c353658e8d13a548a9913fe5fcb.exe 5028 svchcst.exe 4988 svchcst.exe 5028 svchcst.exe 4988 svchcst.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4664 wrote to memory of 2888 4664 cbad60cad73dce60051ddfa91506c8f760de8c353658e8d13a548a9913fe5fcb.exe 93 PID 4664 wrote to memory of 2888 4664 cbad60cad73dce60051ddfa91506c8f760de8c353658e8d13a548a9913fe5fcb.exe 93 PID 4664 wrote to memory of 2888 4664 cbad60cad73dce60051ddfa91506c8f760de8c353658e8d13a548a9913fe5fcb.exe 93 PID 4664 wrote to memory of 4444 4664 cbad60cad73dce60051ddfa91506c8f760de8c353658e8d13a548a9913fe5fcb.exe 94 PID 4664 wrote to memory of 4444 4664 cbad60cad73dce60051ddfa91506c8f760de8c353658e8d13a548a9913fe5fcb.exe 94 PID 4664 wrote to memory of 4444 4664 cbad60cad73dce60051ddfa91506c8f760de8c353658e8d13a548a9913fe5fcb.exe 94 PID 2888 wrote to memory of 5028 2888 WScript.exe 100 PID 2888 wrote to memory of 5028 2888 WScript.exe 100 PID 2888 wrote to memory of 5028 2888 WScript.exe 100 PID 4444 wrote to memory of 4988 4444 WScript.exe 101 PID 4444 wrote to memory of 4988 4444 WScript.exe 101 PID 4444 wrote to memory of 4988 4444 WScript.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\cbad60cad73dce60051ddfa91506c8f760de8c353658e8d13a548a9913fe5fcb.exe"C:\Users\Admin\AppData\Local\Temp\cbad60cad73dce60051ddfa91506c8f760de8c353658e8d13a548a9913fe5fcb.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5028
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4988
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4336,i,16316361669272684588,6171287487746154806,262144 --variations-seed-version --mojo-platform-channel-handle=4328 /prefetch:81⤵PID:4400
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
753B
MD587feb2bb0d07e65a746f84447e52412a
SHA19eab43e9f456c3a2adf4f9274a42c5dda588ae8a
SHA2565d33d6be23c480d5a3ec7f3cbad7280013dfd618399f0a76583965482fca772e
SHA512ec0c988a977b41559d18d4f446d0eb59b972ef65a171446a943ce3bc666d0339e0c109e858368ebd991f6f579afc704a8c6251fe49d6e226e6fe5c2df81da468
-
Filesize
1.1MB
MD5d8ca7a93eb0a9320be3345b67f392d8c
SHA1fec1b8d71248dac54821736823a34c77967f08ce
SHA256f42fdae1c30696bee7dee90132a6dac94021a5b6d2f586267ae5ce9bf474dcf3
SHA51201f2daa3f607977374812dd5dea0b3cf3c68d230e4193c2a22ecde76f9343d1b940048c1a0129c219b73a739c1afa2a427ea1c36f6e3e068a4f1e5f402b03ec2