Analysis
-
max time kernel
118s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2024, 19:17
Static task
static1
Behavioral task
behavioral1
Sample
064f50c820d0e2a39d900fee37ec7903305573fcdfa7aeb92bae270952a3d19a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
064f50c820d0e2a39d900fee37ec7903305573fcdfa7aeb92bae270952a3d19a.exe
Resource
win10v2004-20240802-en
General
-
Target
064f50c820d0e2a39d900fee37ec7903305573fcdfa7aeb92bae270952a3d19a.exe
-
Size
1.1MB
-
MD5
bec24eb85f1e5ab99cfe8423abe7b2a2
-
SHA1
321f678e09014f1cb7c62f48a34e75a498e224f9
-
SHA256
064f50c820d0e2a39d900fee37ec7903305573fcdfa7aeb92bae270952a3d19a
-
SHA512
5d9a6dc8ed1d3ea31016d091f1f7e6503e8a14f47c99346e03cce960a9d1d253d4887d6ba2ba9434cc07a8412d60e8fe647c5e8e5ca6d4c34c70b9e72fcbe4c4
-
SSDEEP
24576:CH0dl8myX9Bg42QoXFkrzkmmlSgRDko0lG4Z8r7Qfbkiu5QX:CcaClSFlG4ZM7QzMw
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation 064f50c820d0e2a39d900fee37ec7903305573fcdfa7aeb92bae270952a3d19a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 064f50c820d0e2a39d900fee37ec7903305573fcdfa7aeb92bae270952a3d19a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings 064f50c820d0e2a39d900fee37ec7903305573fcdfa7aeb92bae270952a3d19a.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 644 064f50c820d0e2a39d900fee37ec7903305573fcdfa7aeb92bae270952a3d19a.exe 644 064f50c820d0e2a39d900fee37ec7903305573fcdfa7aeb92bae270952a3d19a.exe 644 064f50c820d0e2a39d900fee37ec7903305573fcdfa7aeb92bae270952a3d19a.exe 644 064f50c820d0e2a39d900fee37ec7903305573fcdfa7aeb92bae270952a3d19a.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 644 064f50c820d0e2a39d900fee37ec7903305573fcdfa7aeb92bae270952a3d19a.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 644 064f50c820d0e2a39d900fee37ec7903305573fcdfa7aeb92bae270952a3d19a.exe 644 064f50c820d0e2a39d900fee37ec7903305573fcdfa7aeb92bae270952a3d19a.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 644 wrote to memory of 3724 644 064f50c820d0e2a39d900fee37ec7903305573fcdfa7aeb92bae270952a3d19a.exe 83 PID 644 wrote to memory of 3724 644 064f50c820d0e2a39d900fee37ec7903305573fcdfa7aeb92bae270952a3d19a.exe 83 PID 644 wrote to memory of 3724 644 064f50c820d0e2a39d900fee37ec7903305573fcdfa7aeb92bae270952a3d19a.exe 83 PID 644 wrote to memory of 4808 644 064f50c820d0e2a39d900fee37ec7903305573fcdfa7aeb92bae270952a3d19a.exe 82 PID 644 wrote to memory of 4808 644 064f50c820d0e2a39d900fee37ec7903305573fcdfa7aeb92bae270952a3d19a.exe 82 PID 644 wrote to memory of 4808 644 064f50c820d0e2a39d900fee37ec7903305573fcdfa7aeb92bae270952a3d19a.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\064f50c820d0e2a39d900fee37ec7903305573fcdfa7aeb92bae270952a3d19a.exe"C:\Users\Admin\AppData\Local\Temp\064f50c820d0e2a39d900fee37ec7903305573fcdfa7aeb92bae270952a3d19a.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:644 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- System Location Discovery: System Language Discovery
PID:4808
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- System Location Discovery: System Language Discovery
PID:3724
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
753B
MD591a572cf46b951a9ad1516fd3c16357a
SHA1003ab3e8c5c22b2a18848d65cccc07e47ee4a727
SHA2564a7b6c4672162afa7c52534c29baeddd973d98b399ff5c1721842eaf2d418d35
SHA512ca5a946ad0caf0f29ea163fc47ab548ed90c588c9e015349e5130ed48d4a1668d646966ac21445289b23acdad368203865c2e7ef3c10270b41065f363ea988e6