Analysis

  • max time kernel
    162s
  • max time network
    171s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    01-02-2022 05:42

General

  • Target

    73da7ffa3619e3e8afbc2334219f1bd4be18b4128d835e2dfa9db8e3a9e239f5.js

  • Size

    26KB

  • MD5

    5e56d42c27affc6c662d1d43b9b4ef1d

  • SHA1

    6ebf6ec3ec7df9003172d2f7d184e57bbeee4a83

  • SHA256

    73da7ffa3619e3e8afbc2334219f1bd4be18b4128d835e2dfa9db8e3a9e239f5

  • SHA512

    9cc9688e1ed5c6497360de986e9a5d9f4f6620d3318705b9d661f56761a5591da321ea569804915ef5844ddf01a1ed8cfd91e63f6d336b98c96ae9a5ecff3bc1

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Sets service image path in registry 2 TTPs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies data under HKEY_USERS 41 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\73da7ffa3619e3e8afbc2334219f1bd4be18b4128d835e2dfa9db8e3a9e239f5.js
    1⤵
    • Blocklisted process makes network request
    • Checks computer location settings
    PID:4084
  • C:\Windows\System32\WaaSMedicAgent.exe
    C:\Windows\System32\WaaSMedicAgent.exe 29e53d2d3ac839577f2f21d8d92ea076 LDYsgnA3jkCrwiQahBABGA.0.1.0.0.0
    1⤵
    • Modifies data under HKEY_USERS
    PID:4240
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:324

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/324-227-0x0000024FDAB60000-0x0000024FDAB70000-memory.dmp

    Filesize

    64KB

  • memory/324-234-0x0000024FDD8E0000-0x0000024FDD8E4000-memory.dmp

    Filesize

    16KB