Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/09/2024, 14:24
Behavioral task
behavioral1
Sample
161cd255fa43ac5fbf6b7de383fd12ef1a6eb4f23e0376d7fd9cd6a674bf1c34.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
161cd255fa43ac5fbf6b7de383fd12ef1a6eb4f23e0376d7fd9cd6a674bf1c34.exe
Resource
win10v2004-20240802-en
General
-
Target
161cd255fa43ac5fbf6b7de383fd12ef1a6eb4f23e0376d7fd9cd6a674bf1c34.exe
-
Size
1.5MB
-
MD5
3d22af53e3f190a4d7741c37e1efdd00
-
SHA1
5671d0cedc901deaf9ad1faaa2d001b6707d8036
-
SHA256
161cd255fa43ac5fbf6b7de383fd12ef1a6eb4f23e0376d7fd9cd6a674bf1c34
-
SHA512
56d223d8b27ff782b81b158ce915451f14139ff89c334446e1b338a84b4c1f5398351957537e87a726b3573568204d22894d2d071890fdb8c5bc913caf963cfc
-
SSDEEP
24576:ujtC6RxD1hMbipXcvvX8wirRtcuO2hl5GdYquD+oHlG4Xt4JgWJCj8zDVpJE8:ujtxttI2vquflG4XtggWJMj8
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation 161cd255fa43ac5fbf6b7de383fd12ef1a6eb4f23e0376d7fd9cd6a674bf1c34.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\win.lnk 161cd255fa43ac5fbf6b7de383fd12ef1a6eb4f23e0376d7fd9cd6a674bf1c34.exe -
resource yara_rule behavioral2/memory/4992-0-0x0000000000400000-0x0000000000580000-memory.dmp upx behavioral2/files/0x000900000002344b-11.dat upx behavioral2/memory/4992-16-0x0000000000400000-0x0000000000580000-memory.dmp upx behavioral2/memory/4992-19-0x0000000000400000-0x0000000000580000-memory.dmp upx behavioral2/memory/4992-22-0x0000000000400000-0x0000000000580000-memory.dmp upx behavioral2/memory/4992-26-0x0000000000400000-0x0000000000580000-memory.dmp upx behavioral2/memory/4992-29-0x0000000000400000-0x0000000000580000-memory.dmp upx behavioral2/memory/4992-32-0x0000000000400000-0x0000000000580000-memory.dmp upx behavioral2/memory/4992-35-0x0000000000400000-0x0000000000580000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\360safo = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\svchcst.exe" 161cd255fa43ac5fbf6b7de383fd12ef1a6eb4f23e0376d7fd9cd6a674bf1c34.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 161cd255fa43ac5fbf6b7de383fd12ef1a6eb4f23e0376d7fd9cd6a674bf1c34.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\Local Settings 161cd255fa43ac5fbf6b7de383fd12ef1a6eb4f23e0376d7fd9cd6a674bf1c34.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 4992 161cd255fa43ac5fbf6b7de383fd12ef1a6eb4f23e0376d7fd9cd6a674bf1c34.exe 4992 161cd255fa43ac5fbf6b7de383fd12ef1a6eb4f23e0376d7fd9cd6a674bf1c34.exe 4992 161cd255fa43ac5fbf6b7de383fd12ef1a6eb4f23e0376d7fd9cd6a674bf1c34.exe 4992 161cd255fa43ac5fbf6b7de383fd12ef1a6eb4f23e0376d7fd9cd6a674bf1c34.exe 4992 161cd255fa43ac5fbf6b7de383fd12ef1a6eb4f23e0376d7fd9cd6a674bf1c34.exe 4992 161cd255fa43ac5fbf6b7de383fd12ef1a6eb4f23e0376d7fd9cd6a674bf1c34.exe 4992 161cd255fa43ac5fbf6b7de383fd12ef1a6eb4f23e0376d7fd9cd6a674bf1c34.exe 4992 161cd255fa43ac5fbf6b7de383fd12ef1a6eb4f23e0376d7fd9cd6a674bf1c34.exe 4992 161cd255fa43ac5fbf6b7de383fd12ef1a6eb4f23e0376d7fd9cd6a674bf1c34.exe 4992 161cd255fa43ac5fbf6b7de383fd12ef1a6eb4f23e0376d7fd9cd6a674bf1c34.exe 4992 161cd255fa43ac5fbf6b7de383fd12ef1a6eb4f23e0376d7fd9cd6a674bf1c34.exe 4992 161cd255fa43ac5fbf6b7de383fd12ef1a6eb4f23e0376d7fd9cd6a674bf1c34.exe 4992 161cd255fa43ac5fbf6b7de383fd12ef1a6eb4f23e0376d7fd9cd6a674bf1c34.exe 4992 161cd255fa43ac5fbf6b7de383fd12ef1a6eb4f23e0376d7fd9cd6a674bf1c34.exe 4992 161cd255fa43ac5fbf6b7de383fd12ef1a6eb4f23e0376d7fd9cd6a674bf1c34.exe 4992 161cd255fa43ac5fbf6b7de383fd12ef1a6eb4f23e0376d7fd9cd6a674bf1c34.exe 4992 161cd255fa43ac5fbf6b7de383fd12ef1a6eb4f23e0376d7fd9cd6a674bf1c34.exe 4992 161cd255fa43ac5fbf6b7de383fd12ef1a6eb4f23e0376d7fd9cd6a674bf1c34.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4992 161cd255fa43ac5fbf6b7de383fd12ef1a6eb4f23e0376d7fd9cd6a674bf1c34.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4992 161cd255fa43ac5fbf6b7de383fd12ef1a6eb4f23e0376d7fd9cd6a674bf1c34.exe 4992 161cd255fa43ac5fbf6b7de383fd12ef1a6eb4f23e0376d7fd9cd6a674bf1c34.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4992 wrote to memory of 4328 4992 161cd255fa43ac5fbf6b7de383fd12ef1a6eb4f23e0376d7fd9cd6a674bf1c34.exe 86 PID 4992 wrote to memory of 4328 4992 161cd255fa43ac5fbf6b7de383fd12ef1a6eb4f23e0376d7fd9cd6a674bf1c34.exe 86 PID 4992 wrote to memory of 4328 4992 161cd255fa43ac5fbf6b7de383fd12ef1a6eb4f23e0376d7fd9cd6a674bf1c34.exe 86 PID 4992 wrote to memory of 4756 4992 161cd255fa43ac5fbf6b7de383fd12ef1a6eb4f23e0376d7fd9cd6a674bf1c34.exe 85 PID 4992 wrote to memory of 4756 4992 161cd255fa43ac5fbf6b7de383fd12ef1a6eb4f23e0376d7fd9cd6a674bf1c34.exe 85 PID 4992 wrote to memory of 4756 4992 161cd255fa43ac5fbf6b7de383fd12ef1a6eb4f23e0376d7fd9cd6a674bf1c34.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\161cd255fa43ac5fbf6b7de383fd12ef1a6eb4f23e0376d7fd9cd6a674bf1c34.exe"C:\Users\Admin\AppData\Local\Temp\161cd255fa43ac5fbf6b7de383fd12ef1a6eb4f23e0376d7fd9cd6a674bf1c34.exe"1⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- System Location Discovery: System Language Discovery
PID:4756
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- System Location Discovery: System Language Discovery
PID:4328
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92B
MD5616ffedca89dfde66c19c781ec4933c5
SHA105d28ae3243fbaed0b925f218c1c7c71a5dbbca1
SHA2567bfcc2f0d3c25f895eac6676d4ce9f16713149206980fb97f4aa4272e82ed2b8
SHA5128a6fa82b124203512e1ed3d4ad037df7a3c2ec3d8f1db6b5d4e591ccb08c1c44b2a8589d769697c0f1ea35e711b38eb8fbab3fa3a24be99d099782b9c6c25a8f
-
Filesize
753B
MD58f9cfa08b14a3b0546c20ffbd1162680
SHA10747e887e30fdf90237bbc2393f2966d6d431bed
SHA256a4d4e4749e9cce50ac02745b8450e46eeef6f9e2e3c1faa6e7370eab499a94b2
SHA512bf872415685bf93ce4d9c5c96870059aee2b96145d93076263d620e7378eccaf34bffb7732147079fd0852e7b7996f68f0cb0b483b320324d230bd36ae7dfa14
-
Filesize
1.5MB
MD5ef55ec64dd2e94fe58b706361c3f6e05
SHA16b014af498d625ba44487b2ba3ede65212330afd
SHA256ef44b19f174550a004039fd94527489cba3b09a776deba4fcfc76830dafcae5b
SHA512b4c803e7bba3608424bef85cf41ae7b14eb4ad130f3cf696c70a664ffb4a3af40391f4a8cb97d034f1e10052e9cb3cd611bdee0606202fb8e3196d1366c36811