Analysis

  • max time kernel
    95s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/11/2024, 08:39

General

  • Target

    d6efa90d2b7cf0aabc00d25c40b9cef231ab81b055c6b5e47655630bb1cc62bf.vbe

  • Size

    1.6MB

  • MD5

    76c9e79512fae43cf3418e7ffd2e6d7e

  • SHA1

    83604bad711a92e9ec62a342311c8d3701f75516

  • SHA256

    d6efa90d2b7cf0aabc00d25c40b9cef231ab81b055c6b5e47655630bb1cc62bf

  • SHA512

    981d53e103297efbca428c2ff41d216af21979d4818605066a2da6aca1bfee05b0fe9d1f4a3aae7b561d1e14526d5063ead985250724c0ba748eef7be7066bb2

  • SSDEEP

    24576:tjkxjYmgPzdgQpoaDR5zPYNUgMbHORCOWsIGKA4SLAGIV2RwtZ3AQEyrPvbvGcUW:R

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\d6efa90d2b7cf0aabc00d25c40b9cef231ab81b055c6b5e47655630bb1cc62bf.vbe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2540
    • C:\Users\Admin\AppData\Local\Temp\temp_glvfS.exe
      "C:\Users\Admin\AppData\Local\Temp\temp_glvfS.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3144
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:5084

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\temp_glvfS.exe

    Filesize

    774KB

    MD5

    36972ab0b73f25f92b42448d6faaea58

    SHA1

    18782056df033e6602800453fde691cdd15262f9

    SHA256

    ea2416415a1453f3431f33b2cbad63d8496f7c4450c021be197e52d8e23fe84e

    SHA512

    b035957f5a6dbe31978670e618a6dbfa461b864971e1a0429fee7dfb17330a3d19fc29f0649f08888488cf8fba51e48f0cc18e0af0fd0f654ad77326d1f76861

  • memory/3144-11-0x000000007467E000-0x000000007467F000-memory.dmp

    Filesize

    4KB

  • memory/3144-12-0x0000000000F70000-0x0000000001038000-memory.dmp

    Filesize

    800KB

  • memory/3144-13-0x0000000074670000-0x0000000074E20000-memory.dmp

    Filesize

    7.7MB

  • memory/3144-16-0x0000000074670000-0x0000000074E20000-memory.dmp

    Filesize

    7.7MB

  • memory/5084-14-0x0000000000400000-0x0000000000447000-memory.dmp

    Filesize

    284KB

  • memory/5084-17-0x0000000002FE0000-0x000000000332A000-memory.dmp

    Filesize

    3.3MB

  • memory/5084-18-0x0000000000400000-0x0000000000447000-memory.dmp

    Filesize

    284KB

  • memory/5084-19-0x0000000000400000-0x0000000000447000-memory.dmp

    Filesize

    284KB