Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/09/2024, 14:24

General

  • Target

    161cd255fa43ac5fbf6b7de383fd12ef1a6eb4f23e0376d7fd9cd6a674bf1c34.exe

  • Size

    1.5MB

  • MD5

    3d22af53e3f190a4d7741c37e1efdd00

  • SHA1

    5671d0cedc901deaf9ad1faaa2d001b6707d8036

  • SHA256

    161cd255fa43ac5fbf6b7de383fd12ef1a6eb4f23e0376d7fd9cd6a674bf1c34

  • SHA512

    56d223d8b27ff782b81b158ce915451f14139ff89c334446e1b338a84b4c1f5398351957537e87a726b3573568204d22894d2d071890fdb8c5bc913caf963cfc

  • SSDEEP

    24576:ujtC6RxD1hMbipXcvvX8wirRtcuO2hl5GdYquD+oHlG4Xt4JgWJCj8zDVpJE8:ujtxttI2vquflG4XtggWJMj8

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\161cd255fa43ac5fbf6b7de383fd12ef1a6eb4f23e0376d7fd9cd6a674bf1c34.exe
    "C:\Users\Admin\AppData\Local\Temp\161cd255fa43ac5fbf6b7de383fd12ef1a6eb4f23e0376d7fd9cd6a674bf1c34.exe"
    1⤵
    • Checks computer location settings
    • Drops startup file
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4992
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4756
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4328

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Config.ini

    Filesize

    92B

    MD5

    616ffedca89dfde66c19c781ec4933c5

    SHA1

    05d28ae3243fbaed0b925f218c1c7c71a5dbbca1

    SHA256

    7bfcc2f0d3c25f895eac6676d4ce9f16713149206980fb97f4aa4272e82ed2b8

    SHA512

    8a6fa82b124203512e1ed3d4ad037df7a3c2ec3d8f1db6b5d4e591ccb08c1c44b2a8589d769697c0f1ea35e711b38eb8fbab3fa3a24be99d099782b9c6c25a8f

  • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

    Filesize

    753B

    MD5

    8f9cfa08b14a3b0546c20ffbd1162680

    SHA1

    0747e887e30fdf90237bbc2393f2966d6d431bed

    SHA256

    a4d4e4749e9cce50ac02745b8450e46eeef6f9e2e3c1faa6e7370eab499a94b2

    SHA512

    bf872415685bf93ce4d9c5c96870059aee2b96145d93076263d620e7378eccaf34bffb7732147079fd0852e7b7996f68f0cb0b483b320324d230bd36ae7dfa14

  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    1.5MB

    MD5

    ef55ec64dd2e94fe58b706361c3f6e05

    SHA1

    6b014af498d625ba44487b2ba3ede65212330afd

    SHA256

    ef44b19f174550a004039fd94527489cba3b09a776deba4fcfc76830dafcae5b

    SHA512

    b4c803e7bba3608424bef85cf41ae7b14eb4ad130f3cf696c70a664ffb4a3af40391f4a8cb97d034f1e10052e9cb3cd611bdee0606202fb8e3196d1366c36811

  • memory/4992-0-0x0000000000400000-0x0000000000580000-memory.dmp

    Filesize

    1.5MB

  • memory/4992-16-0x0000000000400000-0x0000000000580000-memory.dmp

    Filesize

    1.5MB

  • memory/4992-19-0x0000000000400000-0x0000000000580000-memory.dmp

    Filesize

    1.5MB

  • memory/4992-22-0x0000000000400000-0x0000000000580000-memory.dmp

    Filesize

    1.5MB

  • memory/4992-26-0x0000000000400000-0x0000000000580000-memory.dmp

    Filesize

    1.5MB

  • memory/4992-29-0x0000000000400000-0x0000000000580000-memory.dmp

    Filesize

    1.5MB

  • memory/4992-32-0x0000000000400000-0x0000000000580000-memory.dmp

    Filesize

    1.5MB

  • memory/4992-35-0x0000000000400000-0x0000000000580000-memory.dmp

    Filesize

    1.5MB