Analysis

  • max time kernel
    52s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    28-09-2024 08:53

General

  • Target

    3ab6279d6730ce25ad71cc0b9d06c74d6221eaf91895fa58da2442bbc7c2bea6N.exe

  • Size

    1.1MB

  • MD5

    3c1e181904e9ae6b262cb3c54f392ef0

  • SHA1

    feb78b490f382bee7614c46bccd1b624b4cf99d0

  • SHA256

    3ab6279d6730ce25ad71cc0b9d06c74d6221eaf91895fa58da2442bbc7c2bea6

  • SHA512

    f7513226b317043db2bda09c366c7e4b66c9a2a827f8b95be9df0de6bbf9e3fe562e341c7176154dae1036fdc02274eb0dfff26738669ce836951477ff63d7d2

  • SSDEEP

    24576:aH0dl8myX9Bg42QoXFkrzkmplSgRDYo0lG4Z8r7Qfbkiu5Q8:acallSllG4ZM7QzML

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 17 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 19 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 20 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3ab6279d6730ce25ad71cc0b9d06c74d6221eaf91895fa58da2442bbc7c2bea6N.exe
    "C:\Users\Admin\AppData\Local\Temp\3ab6279d6730ce25ad71cc0b9d06c74d6221eaf91895fa58da2442bbc7c2bea6N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2336
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1912
      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
        3⤵
        • Deletes itself
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2828
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
          4⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2532
          • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2004
            • C:\Windows\SysWOW64\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
              6⤵
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2052
              • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                7⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:2772
                • C:\Windows\SysWOW64\WScript.exe
                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                  8⤵
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:1752
                  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                    "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                    9⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of SetWindowsHookEx
                    • Suspicious use of WriteProcessMemory
                    PID:1860
                    • C:\Windows\SysWOW64\WScript.exe
                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                      10⤵
                      • Loads dropped DLL
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of WriteProcessMemory
                      PID:112
                      • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                        "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                        11⤵
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        • Suspicious use of SetWindowsHookEx
                        • Suspicious use of WriteProcessMemory
                        PID:1332
                        • C:\Windows\SysWOW64\WScript.exe
                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                          12⤵
                          • Loads dropped DLL
                          • System Location Discovery: System Language Discovery
                          • Suspicious use of WriteProcessMemory
                          PID:596
                          • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                            "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                            13⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            • Suspicious use of SetWindowsHookEx
                            • Suspicious use of WriteProcessMemory
                            PID:2072
                            • C:\Windows\SysWOW64\WScript.exe
                              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                              14⤵
                              • Loads dropped DLL
                              • System Location Discovery: System Language Discovery
                              • Suspicious use of WriteProcessMemory
                              PID:484
                              • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                15⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                • Suspicious use of SetWindowsHookEx
                                • Suspicious use of WriteProcessMemory
                                PID:772
                                • C:\Windows\SysWOW64\WScript.exe
                                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                  16⤵
                                  • Loads dropped DLL
                                  • System Location Discovery: System Language Discovery
                                  PID:2440
                                  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                    "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                    17⤵
                                    • Executes dropped EXE
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious use of SetWindowsHookEx
                                    PID:2196
                                • C:\Windows\SysWOW64\WScript.exe
                                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
                                  16⤵
                                  • Loads dropped DLL
                                  • System Location Discovery: System Language Discovery
                                  PID:1956
                                  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe
                                    "C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"
                                    17⤵
                                    • Executes dropped EXE
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious use of SetWindowsHookEx
                                    PID:2824

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Config.ini

    Filesize

    92B

    MD5

    67b9b3e2ded7086f393ebbc36c5e7bca

    SHA1

    e6299d0450b9a92a18cc23b5704a2b475652c790

    SHA256

    44063c266686263f14cd2a83fee124fb3e61a9171a6aab69709464f49511011d

    SHA512

    826fbc9481f46b1ae3db828a665c55c349023caf563e6e8c17321f5f3af3e4c3914955db6f0eebfc6defe561315435d47310b4d0499ab9c2c85bb61264dedc09

  • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

    Filesize

    754B

    MD5

    574a7f3c97e298453bf4adc546a3a748

    SHA1

    a44dfde96ad9a19f9139b84f03520b3ed623a90b

    SHA256

    2e26b005dbf4f79af286467b7926dc81464ca2faea42bd66692cf0f09eefb8b8

    SHA512

    5e0ee310ffbdcc797129d46c07e4d36ee488b93ebd584063e8cfadfe87d41e33802b31bbff7611d7c43336640d7782ba256c7ce5a8ed051a1b22259cef8d29a9

  • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

    Filesize

    696B

    MD5

    9f87870aabac31b89e8f641cc4796a67

    SHA1

    0e7c4d9fa14eb4afe07e0ded564229685c3cbe4b

    SHA256

    c5ccc91ebc3838b354e5ae05c7b3efa01813e004b427f843ba23e78ff272e695

    SHA512

    28c7fe3049354286831a5c2b52ea96583bef30c4a294d07bfb10c11bb9e3469b944d8029d58f73611daa616a279e280d0c14fa037d390ab34a5daa2f5a25c4f6

  • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

    Filesize

    696B

    MD5

    9627e3850f4f7495f6d36ebae56aa594

    SHA1

    001694633bc632a7ae2812ed74828335bec77531

    SHA256

    0aeaf02fb74a0799c8eccaa37e1586435318608e7945b8084fe87f956822cb25

    SHA512

    03986ee3b4faf96fdb2bdeb1c41e216c81e1c0f7d4403b69c7e7e39baa45e2806d57fad32904bdf04728eb9db7570d94341e73bf8a1f6ba1964072a65de4e894

  • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

    Filesize

    696B

    MD5

    a7abbe21bd06224da6044ceefc079882

    SHA1

    45948d51fb8d65cd1032448311043927dcfa0d2f

    SHA256

    5f4905388f1de9cd98bc931f1f041dd2543394219661a271c11fff5b0d8222b2

    SHA512

    3371b7d36aadb7aa31617ba0d8cb23e2ccd36c8268946e8ec526e98e61d0312622b089331f05a36775fd59174fa8a68595e664a665feeb9afce17c906a8b1bd5

  • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

    Filesize

    696B

    MD5

    03088ab16e4136b8d3a3366505b767ed

    SHA1

    e1d73c9dc7e6009659519b33b3dd80f3011adad8

    SHA256

    b31956814f1bc7c1e47a025622160df37664a3ee8e6d2016ce8919f1fba63a59

    SHA512

    0c841cc8236b405951c5bdf0ea7c620ef32ab930077442e5c1f2eca9fe474c113e1377829e8072afdbfd9a0f0b2797cf156b2f861395d14b851abc7b365ec11a

  • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

    Filesize

    696B

    MD5

    93bffb400f506fbd69421b6075802c65

    SHA1

    b9d8c4ea6a8fd739f6cf167e1f58412525f15784

    SHA256

    2e455d4d9ba6db3056e273b33c3cc67d60d76c4a750b98b2d4d0e2bcc6aa57b1

    SHA512

    e00a5d4ad19c488dc18e50150fcd50505133666e333f12f9e0cb3a894162951e4195886798de3531561ff99b4a3fbca6fb351f1ff0bcd0e1ac20cd685962ec23

  • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

    Filesize

    696B

    MD5

    1ac4421f71447c6f92ce3ac17a3d9d38

    SHA1

    97f4ebc5875af7ee54f93ba70089361ca88da8af

    SHA256

    615df52b00308d2a7f8aed927fd28d1e40b5ac6cf5e6da78ec69acd149618d59

    SHA512

    3d7d6a0124324731462a5e71d797c77e9942371fbdda8b870cb9d035db293ef1765e1890737fd89fd1b9d56941bd04745f93c95c844057830605365367ea410e

  • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

    Filesize

    696B

    MD5

    d9ab21af2046aedc3484d569036c3ef7

    SHA1

    ade5e9eb5b1180a77a2164e61f74beb411cdfb56

    SHA256

    90b8f17e573879b63c512e7c0dd6ff9454d177163e2d95d0090b2ef22ae5ec79

    SHA512

    cb8c202cd3d66ee897982e42257320dfef0a23eb96b9a3189869e9a0ce030d4baaa8c0a6fc5e197d2d19d742b0d7b3f34adb12933192dd6e4b1388433755d1ac

  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    1.1MB

    MD5

    6901874fc7830628454eef47aefac631

    SHA1

    0fc3dddee36665d37ea99022e69a4fd9488d3d2c

    SHA256

    ac722c42a5406df4a7d3dbe7db1d137d277a833db997964b8dcba62f63ae669d

    SHA512

    8a8b0c73b9a3d2b0b3dac0254fecc34d8a1afdfd185c9250d1d0e662d712c1cdc7a42ecc6d4ab48479e823bf9d581b3ca76a706290e00ac0660d2a19c55e785e

  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    1.1MB

    MD5

    1407c2fa254b7077a0e3bf4d4ae333d9

    SHA1

    2702a21e47203b31c1c71a3b381fb266ac1b4b41

    SHA256

    953a143a1671321b95be3cf1a7cbd6dab113a803b6e4142fded9c04cac57f237

    SHA512

    792e2043cdd6044482b82eda3927e9c0aafc172ca195b110b60d42f177dcdcbf5bd28b0050139cc4e8a200be6fae94bbbf7e3db0251fa37aa07a1f635c1b698d

  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    1.1MB

    MD5

    75ac53ccca29612391ae8626f864b7f1

    SHA1

    355d3437b4166c036c4343be02982fe0c659c324

    SHA256

    d72dc8ccce15e4d3f564f03f67dc3b9ac457f49946c1e556f7b8c90920703644

    SHA512

    0da5484614c902a68eedc959711a664207e7bfb010df995eb56756c0ab2b03cac4440cdd29d8ff4e7c792542e21e9cc140d10355367ba6d0baae90698f262443

  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    1.1MB

    MD5

    5afab2b0fc7c4accb072f4b8f0fc0815

    SHA1

    53edafb2b273b3965075395854d8b60eb9ed936a

    SHA256

    0d1fdf9f6ea544f9a3a4929d84fe0064f69b84bb13393e3016ec6b01dbe849ce

    SHA512

    19a1bba9f5dab8438fba09c4ceefc6958af7625534cb0076ed6e531d7c74aed6df31b5683bbdd49c15f84fef586739cb1c755ff0c482fdd68c2c2fa472903067

  • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    1.1MB

    MD5

    470583a968d82c8e68be1335dad45527

    SHA1

    3233c3dc59bb71dd1d6fc8656c97a011c4160629

    SHA256

    823e4102fe57e22e7578dbec2530ac29e853b08dfe5b853a80057ba817d24a7e

    SHA512

    70e06dac2fd8488d0b89fd8b3f95151571da0290569eb89a5eb4507bd097ea77ec1f644fdede29476d460c56950fe172f099f42fb8c38d49d7e12051308fea89

  • \Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    1.1MB

    MD5

    a5eaa41411a9e9569054d8b84cd1eae3

    SHA1

    29ae32f735ddcb927d779d8a4c3e3c75b295ff81

    SHA256

    6bfdbfcac071bfba646e9c60b1482cea40c8e5837262208369baabf810266146

    SHA512

    7cbcc41c8350f5da8c0cba7b18ba189af9ed73a9ad1bab35b5ab0e217ae2809df76743f08df5885e4fd109e0b3efae254c956ce2b829f200e2dae9275ac97c38

  • \Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    1.1MB

    MD5

    82bbcd752afadc468650fa9ee9002c64

    SHA1

    5fe8d4ed36396cd6eb83d5b4faa8f92428d2e6c5

    SHA256

    3f1f28db7b2f6670320f8590af706816669b2d30e34bddf0a78598d322df638f

    SHA512

    baa3e4e70ebff70afa1eb55ce822d2e3b8977275ca617ffd67621939a9be8e7c62ac1e15312a408ce401b1f25c789e802871369e2147f47b847900d031862f8c

  • \Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

    Filesize

    1.1MB

    MD5

    5dab9487c681184a621d5a86bb1ef5d5

    SHA1

    4122c704c5e0f5f9495bd824b8b7c235db691104

    SHA256

    82542035538b3ed1671ca626a01a212e49adb679ca7c979d74452fed37b4d659

    SHA512

    12c3b098c48aafb38545a9663bd6abf2685dcecd7417c5b80772d83b4691035ec5975e9415eff057496d07621904db50294e76981f0c9cb008b3c0389bc2448b

  • memory/484-99-0x0000000005B70000-0x0000000005CCF000-memory.dmp

    Filesize

    1.4MB

  • memory/484-100-0x0000000005B70000-0x0000000005CCF000-memory.dmp

    Filesize

    1.4MB

  • memory/596-84-0x0000000005EA0000-0x0000000005FFF000-memory.dmp

    Filesize

    1.4MB

  • memory/772-111-0x0000000000400000-0x000000000055F000-memory.dmp

    Filesize

    1.4MB

  • memory/772-101-0x0000000000400000-0x000000000055F000-memory.dmp

    Filesize

    1.4MB

  • memory/1332-79-0x0000000000400000-0x000000000055F000-memory.dmp

    Filesize

    1.4MB

  • memory/1752-57-0x0000000005BD0000-0x0000000005D2F000-memory.dmp

    Filesize

    1.4MB

  • memory/1860-67-0x0000000000400000-0x000000000055F000-memory.dmp

    Filesize

    1.4MB

  • memory/1912-15-0x00000000046E0000-0x000000000483F000-memory.dmp

    Filesize

    1.4MB

  • memory/1912-13-0x00000000046E0000-0x000000000483F000-memory.dmp

    Filesize

    1.4MB

  • memory/2004-39-0x0000000000400000-0x000000000055F000-memory.dmp

    Filesize

    1.4MB

  • memory/2052-43-0x00000000046D0000-0x000000000482F000-memory.dmp

    Filesize

    1.4MB

  • memory/2072-93-0x0000000000400000-0x000000000055F000-memory.dmp

    Filesize

    1.4MB

  • memory/2196-120-0x0000000000400000-0x000000000055F000-memory.dmp

    Filesize

    1.4MB

  • memory/2336-0-0x0000000000400000-0x000000000055F000-memory.dmp

    Filesize

    1.4MB

  • memory/2336-9-0x0000000000400000-0x000000000055F000-memory.dmp

    Filesize

    1.4MB

  • memory/2440-119-0x0000000004440000-0x000000000459F000-memory.dmp

    Filesize

    1.4MB

  • memory/2440-117-0x0000000004440000-0x000000000459F000-memory.dmp

    Filesize

    1.4MB

  • memory/2532-30-0x00000000043A0000-0x00000000044FF000-memory.dmp

    Filesize

    1.4MB

  • memory/2772-53-0x0000000000400000-0x000000000055F000-memory.dmp

    Filesize

    1.4MB

  • memory/2824-121-0x0000000000400000-0x000000000055F000-memory.dmp

    Filesize

    1.4MB

  • memory/2828-16-0x0000000000400000-0x000000000055F000-memory.dmp

    Filesize

    1.4MB

  • memory/2828-25-0x0000000000400000-0x000000000055F000-memory.dmp

    Filesize

    1.4MB