Analysis

  • max time kernel
    153s
  • max time network
    158s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    24-01-2022 04:16

General

  • Target

    8c770d3424324030887fd6efcd7b989129f1430b8dafb482372240e93c009a24.js

  • Size

    19KB

  • MD5

    fc0f2042e63aebd9b3aeb639501dd827

  • SHA1

    0a15b1eea57b184fdb74402d52af55986177f6b2

  • SHA256

    8c770d3424324030887fd6efcd7b989129f1430b8dafb482372240e93c009a24

  • SHA512

    ecea939e4281f6fb8fb37dc299bcfb3ec282a5b43bb77f379890bab1b769ba7725820db8cabcd193db0fdda1e131cd33f5837fbcabcd65e7ea31aa40419b2154

Score
10/10

Malware Config

Signatures

  • EvilNum JS Component 2 IoCs
  • Evilnum

    A malware family with multiple components distributed through LNK files.

  • Deletes itself 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer Automatic Crash Recovery 1 TTPs 1 IoCs
  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer Protected Mode 1 TTPs 1 IoCs
  • Modifies Internet Explorer Protected Mode Banner 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\8c770d3424324030887fd6efcd7b989129f1430b8dafb482372240e93c009a24.js
    1⤵
    • Deletes itself
    • Suspicious use of WriteProcessMemory
    PID:2396
    • C:\Windows\System32\cscript.exe
      "C:\Windows\System32\cscript.exe" C:\Users\Admin\AppData\Roaming\Microsoft\Credentials\MediaPlayer\MediaManager\media.js
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2784
      • C:\Windows\System32\cscript.exe
        "C:\Windows\System32\cscript.exe" C:\Users\Admin\AppData\Local\Temp\reportapi.js
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2328
        • C:\Windows\System32\reg.exe
          "C:\Windows\System32\reg.exe" import C:\Users\Admin\AppData\Roaming\Microsoft\Credentials\MediaPlayer\MediaManager\media.reg
          4⤵
            PID:3188
          • C:\Windows\System32\reg.exe
            "C:\Windows\System32\reg.exe" import C:\Users\Admin\AppData\Roaming\Microsoft\Credentials\MediaPlayer\MediaManager\mediaIE.reg
            4⤵
            • Modifies Internet Explorer Automatic Crash Recovery
            • Modifies Internet Explorer Phishing Filter
            • Modifies Internet Explorer Protected Mode
            • Modifies Internet Explorer Protected Mode Banner
            PID:2708
          • C:\Windows\System32\cscript.exe
            "C:\Windows\System32\cscript.exe" C:\Users\Admin\AppData\Local\Temp\reportapi.js
            4⤵
              PID:1312
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" -startmediumtab -Embedding
        1⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2536
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2536 CREDAT:82945 /prefetch:2
          2⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2412

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads