Analysis
-
max time kernel
149s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/09/2024, 07:00
Static task
static1
Behavioral task
behavioral1
Sample
b18225a1feb5982ab5848cc18da5ec58cbe39a12b57454c305d99c47cc6f541a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b18225a1feb5982ab5848cc18da5ec58cbe39a12b57454c305d99c47cc6f541a.exe
Resource
win10v2004-20240802-en
General
-
Target
b18225a1feb5982ab5848cc18da5ec58cbe39a12b57454c305d99c47cc6f541a.exe
-
Size
1.1MB
-
MD5
cddf9148b3fb09f3f261cf58bbd198b1
-
SHA1
74d3311bb91c9bd2e5c7dc1f27ed664e94c209ad
-
SHA256
b18225a1feb5982ab5848cc18da5ec58cbe39a12b57454c305d99c47cc6f541a
-
SHA512
d779a892b0eba64db7d21d408425ccee325ec1a870f2bda906441afdd9e7e08066351d428a7fbae72240655f4b3993cca65c6379c2c18bd076a2a4e44ac219d1
-
SSDEEP
24576:CH0dl8myX9Bg42QoXFkrzkmmlSgRDko0lG4Z8r7Qfbkiu5QK:CcaClSFlG4ZM7QzMJ
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation b18225a1feb5982ab5848cc18da5ec58cbe39a12b57454c305d99c47cc6f541a.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation WScript.exe -
Deletes itself 1 IoCs
pid Process 2756 svchcst.exe -
Executes dropped EXE 2 IoCs
pid Process 2756 svchcst.exe 3432 svchcst.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b18225a1feb5982ab5848cc18da5ec58cbe39a12b57454c305d99c47cc6f541a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings b18225a1feb5982ab5848cc18da5ec58cbe39a12b57454c305d99c47cc6f541a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3616 b18225a1feb5982ab5848cc18da5ec58cbe39a12b57454c305d99c47cc6f541a.exe 3616 b18225a1feb5982ab5848cc18da5ec58cbe39a12b57454c305d99c47cc6f541a.exe 3616 b18225a1feb5982ab5848cc18da5ec58cbe39a12b57454c305d99c47cc6f541a.exe 3616 b18225a1feb5982ab5848cc18da5ec58cbe39a12b57454c305d99c47cc6f541a.exe 2756 svchcst.exe 2756 svchcst.exe 2756 svchcst.exe 2756 svchcst.exe 2756 svchcst.exe 2756 svchcst.exe 2756 svchcst.exe 2756 svchcst.exe 2756 svchcst.exe 2756 svchcst.exe 2756 svchcst.exe 2756 svchcst.exe 2756 svchcst.exe 2756 svchcst.exe 2756 svchcst.exe 2756 svchcst.exe 2756 svchcst.exe 2756 svchcst.exe 2756 svchcst.exe 2756 svchcst.exe 2756 svchcst.exe 2756 svchcst.exe 2756 svchcst.exe 2756 svchcst.exe 2756 svchcst.exe 2756 svchcst.exe 2756 svchcst.exe 2756 svchcst.exe 2756 svchcst.exe 2756 svchcst.exe 2756 svchcst.exe 2756 svchcst.exe 2756 svchcst.exe 2756 svchcst.exe 2756 svchcst.exe 2756 svchcst.exe 2756 svchcst.exe 2756 svchcst.exe 2756 svchcst.exe 2756 svchcst.exe 2756 svchcst.exe 2756 svchcst.exe 2756 svchcst.exe 2756 svchcst.exe 2756 svchcst.exe 2756 svchcst.exe 2756 svchcst.exe 2756 svchcst.exe 2756 svchcst.exe 2756 svchcst.exe 2756 svchcst.exe 2756 svchcst.exe 2756 svchcst.exe 2756 svchcst.exe 2756 svchcst.exe 2756 svchcst.exe 2756 svchcst.exe 2756 svchcst.exe 2756 svchcst.exe 2756 svchcst.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3616 b18225a1feb5982ab5848cc18da5ec58cbe39a12b57454c305d99c47cc6f541a.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3616 b18225a1feb5982ab5848cc18da5ec58cbe39a12b57454c305d99c47cc6f541a.exe 3616 b18225a1feb5982ab5848cc18da5ec58cbe39a12b57454c305d99c47cc6f541a.exe 2756 svchcst.exe 2756 svchcst.exe 3432 svchcst.exe 3432 svchcst.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3616 wrote to memory of 4932 3616 b18225a1feb5982ab5848cc18da5ec58cbe39a12b57454c305d99c47cc6f541a.exe 82 PID 3616 wrote to memory of 2760 3616 b18225a1feb5982ab5848cc18da5ec58cbe39a12b57454c305d99c47cc6f541a.exe 83 PID 3616 wrote to memory of 4932 3616 b18225a1feb5982ab5848cc18da5ec58cbe39a12b57454c305d99c47cc6f541a.exe 82 PID 3616 wrote to memory of 4932 3616 b18225a1feb5982ab5848cc18da5ec58cbe39a12b57454c305d99c47cc6f541a.exe 82 PID 3616 wrote to memory of 2760 3616 b18225a1feb5982ab5848cc18da5ec58cbe39a12b57454c305d99c47cc6f541a.exe 83 PID 3616 wrote to memory of 2760 3616 b18225a1feb5982ab5848cc18da5ec58cbe39a12b57454c305d99c47cc6f541a.exe 83 PID 2760 wrote to memory of 2756 2760 WScript.exe 88 PID 2760 wrote to memory of 2756 2760 WScript.exe 88 PID 2760 wrote to memory of 2756 2760 WScript.exe 88 PID 4932 wrote to memory of 3432 4932 WScript.exe 89 PID 4932 wrote to memory of 3432 4932 WScript.exe 89 PID 4932 wrote to memory of 3432 4932 WScript.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\b18225a1feb5982ab5848cc18da5ec58cbe39a12b57454c305d99c47cc6f541a.exe"C:\Users\Admin\AppData\Local\Temp\b18225a1feb5982ab5848cc18da5ec58cbe39a12b57454c305d99c47cc6f541a.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3432
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2756
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
753B
MD5c1ee7e05d1cf8d3a6d26315e3c6e3ab1
SHA1da0d233f1c171c7f940bd57796bdfe54b4149d98
SHA256c547ac55855cd8733c1fed141c2cde3a5d515b6e99369e2386dde2442789f1dd
SHA512ed0f92f0af123ecf354aff8ae0065624c0c2c6fe6c6a9f05e6c9bbd4f0636f3d1775d1fe1016597cd16d798e5475adc8e02beebf5d50f119c4be9ba09acfeb66
-
Filesize
1.1MB
MD5a17322feed7bbdb46637792b36091fa3
SHA1ac1a78ede3cc61ca01072e75f6f176d136d35791
SHA256325a07a4116a60210d9141828b1c338ce94d801413bf95fb83b956a7a7566623
SHA5120510e422e26e119513396e42b2396281d16a00e0c4413a4f8808b7b2d84c55b46d98c170dcb5c08011ec2e8fb0e6257e3d45242e5f8590b396ad9383d3a9bfe8