Analysis

  • max time kernel
    150s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05/10/2024, 22:58

General

  • Target

    d57830354b056accc0420452a5b46b641bac688f4579055d4dce535f3b4e51c0.exe

  • Size

    1.1MB

  • MD5

    d03fe737249ca64f8a95973efd72f3ff

  • SHA1

    c8fa21cf41b8cd48fb8e185cddeb6ea4f1c79ec0

  • SHA256

    d57830354b056accc0420452a5b46b641bac688f4579055d4dce535f3b4e51c0

  • SHA512

    5933d89a8d82978c9814d90daec4eec0cbc755d7a7175722ba4855219d7371ae78741601a848b7cadfff3c563eead6bd011a98d75b344e248a4112abd7ab0ed6

  • SSDEEP

    24576:CH0dl8myX9Bg42QoXFkrzkmmlSgRDko0lG4Z8r7Qfbkiu5Qb:CcaClSFlG4ZM7QzMs

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d57830354b056accc0420452a5b46b641bac688f4579055d4dce535f3b4e51c0.exe
    "C:\Users\Admin\AppData\Local\Temp\d57830354b056accc0420452a5b46b641bac688f4579055d4dce535f3b4e51c0.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2524
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:624

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

          Filesize

          753B

          MD5

          b5c8d73f644ac27df16b4918d08feb2f

          SHA1

          461ec99850607bd073155bafe1dafe8d8e4ca6c4

          SHA256

          2647a1b6a95557f22db83c383e33e2915db1204897ca65ea71912bc9ffbab900

          SHA512

          a20921c9b6e3153bcaf4fb33d3ed02f91bde8daed20fc12475a4ed5b2fbbf0f7b4fc585597eb1f8d29fe4cd644ba6e6a9c70c1e5772f6cff342bfb91e1c55006

        • memory/2524-8-0x0000000000400000-0x0000000000551000-memory.dmp

          Filesize

          1.3MB