Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 19:17
Static task
static1
Behavioral task
behavioral1
Sample
064f50c820d0e2a39d900fee37ec7903305573fcdfa7aeb92bae270952a3d19a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
064f50c820d0e2a39d900fee37ec7903305573fcdfa7aeb92bae270952a3d19a.exe
Resource
win10v2004-20240802-en
General
-
Target
064f50c820d0e2a39d900fee37ec7903305573fcdfa7aeb92bae270952a3d19a.exe
-
Size
1.1MB
-
MD5
bec24eb85f1e5ab99cfe8423abe7b2a2
-
SHA1
321f678e09014f1cb7c62f48a34e75a498e224f9
-
SHA256
064f50c820d0e2a39d900fee37ec7903305573fcdfa7aeb92bae270952a3d19a
-
SHA512
5d9a6dc8ed1d3ea31016d091f1f7e6503e8a14f47c99346e03cce960a9d1d253d4887d6ba2ba9434cc07a8412d60e8fe647c5e8e5ca6d4c34c70b9e72fcbe4c4
-
SSDEEP
24576:CH0dl8myX9Bg42QoXFkrzkmmlSgRDko0lG4Z8r7Qfbkiu5QX:CcaClSFlG4ZM7QzMw
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 064f50c820d0e2a39d900fee37ec7903305573fcdfa7aeb92bae270952a3d19a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3012 064f50c820d0e2a39d900fee37ec7903305573fcdfa7aeb92bae270952a3d19a.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3012 064f50c820d0e2a39d900fee37ec7903305573fcdfa7aeb92bae270952a3d19a.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3012 064f50c820d0e2a39d900fee37ec7903305573fcdfa7aeb92bae270952a3d19a.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3012 064f50c820d0e2a39d900fee37ec7903305573fcdfa7aeb92bae270952a3d19a.exe 3012 064f50c820d0e2a39d900fee37ec7903305573fcdfa7aeb92bae270952a3d19a.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3012 wrote to memory of 2100 3012 064f50c820d0e2a39d900fee37ec7903305573fcdfa7aeb92bae270952a3d19a.exe 30 PID 3012 wrote to memory of 2100 3012 064f50c820d0e2a39d900fee37ec7903305573fcdfa7aeb92bae270952a3d19a.exe 30 PID 3012 wrote to memory of 2100 3012 064f50c820d0e2a39d900fee37ec7903305573fcdfa7aeb92bae270952a3d19a.exe 30 PID 3012 wrote to memory of 2100 3012 064f50c820d0e2a39d900fee37ec7903305573fcdfa7aeb92bae270952a3d19a.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\064f50c820d0e2a39d900fee37ec7903305573fcdfa7aeb92bae270952a3d19a.exe"C:\Users\Admin\AppData\Local\Temp\064f50c820d0e2a39d900fee37ec7903305573fcdfa7aeb92bae270952a3d19a.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- System Location Discovery: System Language Discovery
PID:2100
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
753B
MD5bc9b9443627b952437043e2381ff1275
SHA1c4203f9ad4d4b749f240c3c6c7cfc6b05baea007
SHA2566b3c0a1fcca63034da8d80e95412d3701fa996c1bc7029ba99a8174ae2817e52
SHA5128ec9c0107fb3d676a906d4cb2af92fe9cc9cbfe5bc02dfacf70839979f1d625b56528ad6ef0333c45ad18ce1ea9dca0623678794335ddc74eb9c6497d548db75