Analysis
-
max time kernel
66s -
max time network
15s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
28-07-2021 08:04
Static task
static1
Behavioral task
behavioral1
Sample
POE6709000.JS.js
Resource
win7v20210408
General
-
Target
POE6709000.JS.js
-
Size
2KB
-
MD5
38aed88adfeff1ade7eb881e7974a003
-
SHA1
e2957656134f6fc70a02beac4c28c4865377c9e7
-
SHA256
a01feeb43fac99c6270a8f3b0f3db9de1de8ccaf8edb8e207ed547842fd3cf8d
-
SHA512
65de2bf879e3d801333194a794bbaa9209ea1d76bc96115328688c91c1acede9e352514b88b72171f702686f799c82e2be8e9e83e0da05121690837cf60db03e
Malware Config
Signatures
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
CustAttr .NET packer 1 IoCs
Detects CustAttr .NET packer in memory.
Processes:
resource yara_rule behavioral1/memory/772-66-0x0000000000300000-0x000000000030B000-memory.dmp CustAttr -
Looks for VirtualBox Guest Additions in registry 2 TTPs
-
Blocklisted process makes network request 1 IoCs
Processes:
wscript.exeflow pid process 6 1612 wscript.exe -
Downloads MZ/PE file
-
Executes dropped EXE 6 IoCs
Processes:
Downloader.exeDownloader.exeDownloader.exeDownloader.exeDownloader.exeDownloader.exepid process 772 Downloader.exe 488 Downloader.exe 348 Downloader.exe 300 Downloader.exe 984 Downloader.exe 1604 Downloader.exe -
Looks for VMWare Tools registry key 2 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
Downloader.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Downloader.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Downloader.exe -
Loads dropped DLL 5 IoCs
Processes:
Downloader.exepid process 772 Downloader.exe 772 Downloader.exe 772 Downloader.exe 772 Downloader.exe 772 Downloader.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
Downloader.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum Downloader.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 Downloader.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
Downloader.exepid process 772 Downloader.exe 772 Downloader.exe 772 Downloader.exe 772 Downloader.exe 772 Downloader.exe 772 Downloader.exe 772 Downloader.exe 772 Downloader.exe 772 Downloader.exe 772 Downloader.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Downloader.exedescription pid process Token: SeDebugPrivilege 772 Downloader.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
wscript.exeDownloader.exedescription pid process target process PID 1612 wrote to memory of 772 1612 wscript.exe Downloader.exe PID 1612 wrote to memory of 772 1612 wscript.exe Downloader.exe PID 1612 wrote to memory of 772 1612 wscript.exe Downloader.exe PID 1612 wrote to memory of 772 1612 wscript.exe Downloader.exe PID 772 wrote to memory of 488 772 Downloader.exe Downloader.exe PID 772 wrote to memory of 488 772 Downloader.exe Downloader.exe PID 772 wrote to memory of 488 772 Downloader.exe Downloader.exe PID 772 wrote to memory of 488 772 Downloader.exe Downloader.exe PID 772 wrote to memory of 348 772 Downloader.exe Downloader.exe PID 772 wrote to memory of 348 772 Downloader.exe Downloader.exe PID 772 wrote to memory of 348 772 Downloader.exe Downloader.exe PID 772 wrote to memory of 348 772 Downloader.exe Downloader.exe PID 772 wrote to memory of 300 772 Downloader.exe Downloader.exe PID 772 wrote to memory of 300 772 Downloader.exe Downloader.exe PID 772 wrote to memory of 300 772 Downloader.exe Downloader.exe PID 772 wrote to memory of 300 772 Downloader.exe Downloader.exe PID 772 wrote to memory of 984 772 Downloader.exe Downloader.exe PID 772 wrote to memory of 984 772 Downloader.exe Downloader.exe PID 772 wrote to memory of 984 772 Downloader.exe Downloader.exe PID 772 wrote to memory of 984 772 Downloader.exe Downloader.exe PID 772 wrote to memory of 1604 772 Downloader.exe Downloader.exe PID 772 wrote to memory of 1604 772 Downloader.exe Downloader.exe PID 772 wrote to memory of 1604 772 Downloader.exe Downloader.exe PID 772 wrote to memory of 1604 772 Downloader.exe Downloader.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\POE6709000.JS.js1⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Downloader.exe"C:\Users\Admin\AppData\Local\Temp\Downloader.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Downloader.exe"C:\Users\Admin\AppData\Local\Temp\Downloader.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\Downloader.exe"C:\Users\Admin\AppData\Local\Temp\Downloader.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\Downloader.exe"C:\Users\Admin\AppData\Local\Temp\Downloader.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\Downloader.exe"C:\Users\Admin\AppData\Local\Temp\Downloader.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\Downloader.exe"C:\Users\Admin\AppData\Local\Temp\Downloader.exe"3⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\Downloader.exeMD5
4f9f0d44eac8c320a004a7a7e3aa8f3f
SHA107efcd541a452923168048eea5a68752aca9c705
SHA256a8794fda49fbd75f6b6648e34f4520e92109b6fd28d426052af3b08444528888
SHA5124829c9b674dfd095adc52ee4b742985ff801277d844306e858de3aac72e56a2a383bf0acfe5f4aee18f85b058e894b97b338432c5b45344fa963d4f97e888127
-
C:\Users\Admin\AppData\Local\Temp\Downloader.exeMD5
4f9f0d44eac8c320a004a7a7e3aa8f3f
SHA107efcd541a452923168048eea5a68752aca9c705
SHA256a8794fda49fbd75f6b6648e34f4520e92109b6fd28d426052af3b08444528888
SHA5124829c9b674dfd095adc52ee4b742985ff801277d844306e858de3aac72e56a2a383bf0acfe5f4aee18f85b058e894b97b338432c5b45344fa963d4f97e888127
-
C:\Users\Admin\AppData\Local\Temp\Downloader.exeMD5
4f9f0d44eac8c320a004a7a7e3aa8f3f
SHA107efcd541a452923168048eea5a68752aca9c705
SHA256a8794fda49fbd75f6b6648e34f4520e92109b6fd28d426052af3b08444528888
SHA5124829c9b674dfd095adc52ee4b742985ff801277d844306e858de3aac72e56a2a383bf0acfe5f4aee18f85b058e894b97b338432c5b45344fa963d4f97e888127
-
C:\Users\Admin\AppData\Local\Temp\Downloader.exeMD5
4f9f0d44eac8c320a004a7a7e3aa8f3f
SHA107efcd541a452923168048eea5a68752aca9c705
SHA256a8794fda49fbd75f6b6648e34f4520e92109b6fd28d426052af3b08444528888
SHA5124829c9b674dfd095adc52ee4b742985ff801277d844306e858de3aac72e56a2a383bf0acfe5f4aee18f85b058e894b97b338432c5b45344fa963d4f97e888127
-
C:\Users\Admin\AppData\Local\Temp\Downloader.exeMD5
4f9f0d44eac8c320a004a7a7e3aa8f3f
SHA107efcd541a452923168048eea5a68752aca9c705
SHA256a8794fda49fbd75f6b6648e34f4520e92109b6fd28d426052af3b08444528888
SHA5124829c9b674dfd095adc52ee4b742985ff801277d844306e858de3aac72e56a2a383bf0acfe5f4aee18f85b058e894b97b338432c5b45344fa963d4f97e888127
-
C:\Users\Admin\AppData\Local\Temp\Downloader.exeMD5
4f9f0d44eac8c320a004a7a7e3aa8f3f
SHA107efcd541a452923168048eea5a68752aca9c705
SHA256a8794fda49fbd75f6b6648e34f4520e92109b6fd28d426052af3b08444528888
SHA5124829c9b674dfd095adc52ee4b742985ff801277d844306e858de3aac72e56a2a383bf0acfe5f4aee18f85b058e894b97b338432c5b45344fa963d4f97e888127
-
C:\Users\Admin\AppData\Local\Temp\Downloader.exeMD5
4f9f0d44eac8c320a004a7a7e3aa8f3f
SHA107efcd541a452923168048eea5a68752aca9c705
SHA256a8794fda49fbd75f6b6648e34f4520e92109b6fd28d426052af3b08444528888
SHA5124829c9b674dfd095adc52ee4b742985ff801277d844306e858de3aac72e56a2a383bf0acfe5f4aee18f85b058e894b97b338432c5b45344fa963d4f97e888127
-
\Users\Admin\AppData\Local\Temp\Downloader.exeMD5
4f9f0d44eac8c320a004a7a7e3aa8f3f
SHA107efcd541a452923168048eea5a68752aca9c705
SHA256a8794fda49fbd75f6b6648e34f4520e92109b6fd28d426052af3b08444528888
SHA5124829c9b674dfd095adc52ee4b742985ff801277d844306e858de3aac72e56a2a383bf0acfe5f4aee18f85b058e894b97b338432c5b45344fa963d4f97e888127
-
\Users\Admin\AppData\Local\Temp\Downloader.exeMD5
4f9f0d44eac8c320a004a7a7e3aa8f3f
SHA107efcd541a452923168048eea5a68752aca9c705
SHA256a8794fda49fbd75f6b6648e34f4520e92109b6fd28d426052af3b08444528888
SHA5124829c9b674dfd095adc52ee4b742985ff801277d844306e858de3aac72e56a2a383bf0acfe5f4aee18f85b058e894b97b338432c5b45344fa963d4f97e888127
-
\Users\Admin\AppData\Local\Temp\Downloader.exeMD5
4f9f0d44eac8c320a004a7a7e3aa8f3f
SHA107efcd541a452923168048eea5a68752aca9c705
SHA256a8794fda49fbd75f6b6648e34f4520e92109b6fd28d426052af3b08444528888
SHA5124829c9b674dfd095adc52ee4b742985ff801277d844306e858de3aac72e56a2a383bf0acfe5f4aee18f85b058e894b97b338432c5b45344fa963d4f97e888127
-
\Users\Admin\AppData\Local\Temp\Downloader.exeMD5
4f9f0d44eac8c320a004a7a7e3aa8f3f
SHA107efcd541a452923168048eea5a68752aca9c705
SHA256a8794fda49fbd75f6b6648e34f4520e92109b6fd28d426052af3b08444528888
SHA5124829c9b674dfd095adc52ee4b742985ff801277d844306e858de3aac72e56a2a383bf0acfe5f4aee18f85b058e894b97b338432c5b45344fa963d4f97e888127
-
\Users\Admin\AppData\Local\Temp\Downloader.exeMD5
4f9f0d44eac8c320a004a7a7e3aa8f3f
SHA107efcd541a452923168048eea5a68752aca9c705
SHA256a8794fda49fbd75f6b6648e34f4520e92109b6fd28d426052af3b08444528888
SHA5124829c9b674dfd095adc52ee4b742985ff801277d844306e858de3aac72e56a2a383bf0acfe5f4aee18f85b058e894b97b338432c5b45344fa963d4f97e888127
-
memory/772-68-0x0000000000530000-0x000000000054D000-memory.dmpFilesize
116KB
-
memory/772-67-0x0000000005210000-0x0000000005271000-memory.dmpFilesize
388KB
-
memory/772-60-0x0000000000000000-mapping.dmp
-
memory/772-66-0x0000000000300000-0x000000000030B000-memory.dmpFilesize
44KB
-
memory/772-65-0x0000000004D90000-0x0000000004D91000-memory.dmpFilesize
4KB
-
memory/772-63-0x0000000000320000-0x0000000000321000-memory.dmpFilesize
4KB