Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2024, 06:40
Static task
static1
Behavioral task
behavioral1
Sample
ec9f2d7cb8bc1e3c07dacecfd52a8c7e5f8d604a3cc9bf2d7072dec2b0ee5793.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
ec9f2d7cb8bc1e3c07dacecfd52a8c7e5f8d604a3cc9bf2d7072dec2b0ee5793.exe
Resource
win10v2004-20241007-en
General
-
Target
ec9f2d7cb8bc1e3c07dacecfd52a8c7e5f8d604a3cc9bf2d7072dec2b0ee5793.exe
-
Size
1.1MB
-
MD5
35afecabc123a50638e3cf98eaff24d2
-
SHA1
21c676bb9bebcfd9be1c39ccc9644bd25dece15e
-
SHA256
ec9f2d7cb8bc1e3c07dacecfd52a8c7e5f8d604a3cc9bf2d7072dec2b0ee5793
-
SHA512
efd03ca563941a7f48312b773e11e78128a4c08a64e9fb8e4421e2c2fdead4b6f6de3edc62fde10807793ac11a67cca72900ca51ffe4516b1c9ef4837b97326f
-
SSDEEP
24576:CH0dl8myX9Bg42QoXFkrzkmmlSgRDko0lG4Z8r7Qfbkiu5QH:CcaClSFlG4ZM7QzMg
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation ec9f2d7cb8bc1e3c07dacecfd52a8c7e5f8d604a3cc9bf2d7072dec2b0ee5793.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ec9f2d7cb8bc1e3c07dacecfd52a8c7e5f8d604a3cc9bf2d7072dec2b0ee5793.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings ec9f2d7cb8bc1e3c07dacecfd52a8c7e5f8d604a3cc9bf2d7072dec2b0ee5793.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5028 ec9f2d7cb8bc1e3c07dacecfd52a8c7e5f8d604a3cc9bf2d7072dec2b0ee5793.exe 5028 ec9f2d7cb8bc1e3c07dacecfd52a8c7e5f8d604a3cc9bf2d7072dec2b0ee5793.exe 5028 ec9f2d7cb8bc1e3c07dacecfd52a8c7e5f8d604a3cc9bf2d7072dec2b0ee5793.exe 5028 ec9f2d7cb8bc1e3c07dacecfd52a8c7e5f8d604a3cc9bf2d7072dec2b0ee5793.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 5028 ec9f2d7cb8bc1e3c07dacecfd52a8c7e5f8d604a3cc9bf2d7072dec2b0ee5793.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 5028 ec9f2d7cb8bc1e3c07dacecfd52a8c7e5f8d604a3cc9bf2d7072dec2b0ee5793.exe 5028 ec9f2d7cb8bc1e3c07dacecfd52a8c7e5f8d604a3cc9bf2d7072dec2b0ee5793.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5028 wrote to memory of 4844 5028 ec9f2d7cb8bc1e3c07dacecfd52a8c7e5f8d604a3cc9bf2d7072dec2b0ee5793.exe 83 PID 5028 wrote to memory of 4844 5028 ec9f2d7cb8bc1e3c07dacecfd52a8c7e5f8d604a3cc9bf2d7072dec2b0ee5793.exe 83 PID 5028 wrote to memory of 4844 5028 ec9f2d7cb8bc1e3c07dacecfd52a8c7e5f8d604a3cc9bf2d7072dec2b0ee5793.exe 83 PID 5028 wrote to memory of 3512 5028 ec9f2d7cb8bc1e3c07dacecfd52a8c7e5f8d604a3cc9bf2d7072dec2b0ee5793.exe 84 PID 5028 wrote to memory of 3512 5028 ec9f2d7cb8bc1e3c07dacecfd52a8c7e5f8d604a3cc9bf2d7072dec2b0ee5793.exe 84 PID 5028 wrote to memory of 3512 5028 ec9f2d7cb8bc1e3c07dacecfd52a8c7e5f8d604a3cc9bf2d7072dec2b0ee5793.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec9f2d7cb8bc1e3c07dacecfd52a8c7e5f8d604a3cc9bf2d7072dec2b0ee5793.exe"C:\Users\Admin\AppData\Local\Temp\ec9f2d7cb8bc1e3c07dacecfd52a8c7e5f8d604a3cc9bf2d7072dec2b0ee5793.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- System Location Discovery: System Language Discovery
PID:4844
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- System Location Discovery: System Language Discovery
PID:3512
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
753B
MD5f139012edd89be26e42114166bcfa5c8
SHA1fe85f4458e052dcac3029ef9e0b7aa3b42c353e7
SHA2567e338060cd475948158a6f3adbdf24cff5500786fa3ac72b3df9afc41a18b55a
SHA512c64a62c4bfbd4616ba032de86bff4d0d5080a431343a977b6e25c2d29de1bee173631677a397a52ff110fe4bae29164d8308e1c8e9c9ec1f66c0613d0615b03d