Analysis
-
max time kernel
188s -
max time network
209s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
08-02-2022 01:06
Static task
static1
Behavioral task
behavioral1
Sample
PO-098765MK.js
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
General
-
Target
PO-098765MK.js
-
Size
25KB
-
MD5
139e0e10e1e1a4d2ba7f582c7f090386
-
SHA1
2fd97c48b50d5b1954deda2ec5dcf0e2982226d2
-
SHA256
34118f870c72acd9879333419b07dc6c07269a9905c3654cfa713ad028bf2665
-
SHA512
34d9623b7019b450c5bac34b7f2543f333f16a0676dd1024678a0b40aedcb58d702caf3a04429987f10665b7ef6f0d13066a6c1e98fb89f9296ee1b0f30fdf33
Malware Config
Signatures
-
Blocklisted process makes network request 14 IoCs
Processes:
wscript.exeflow pid process 35 4552 wscript.exe 36 4552 wscript.exe 48 4552 wscript.exe 49 4552 wscript.exe 54 4552 wscript.exe 63 4552 wscript.exe 64 4552 wscript.exe 65 4552 wscript.exe 71 4552 wscript.exe 72 4552 wscript.exe 73 4552 wscript.exe 74 4552 wscript.exe 75 4552 wscript.exe 76 4552 wscript.exe -
Drops startup file 2 IoCs
Processes:
wscript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PO-098765MK.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PO-098765MK.js wscript.exe -
Drops file in Windows directory 8 IoCs
Processes:
svchost.exeTiWorker.exedescription ioc process File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.chk svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.edb svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.jfm svchost.exe File opened for modification C:\Windows\SoftwareDistribution\ReportingEvents.log svchost.exe File opened for modification C:\Windows\Logs\CBS\CBS.log TiWorker.exe File opened for modification C:\Windows\WinSxS\pending.xml TiWorker.exe File opened for modification C:\Windows\WindowsUpdate.log svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
svchost.exeTiWorker.exedescription pid process Token: SeShutdownPrivilege 652 svchost.exe Token: SeCreatePagefilePrivilege 652 svchost.exe Token: SeShutdownPrivilege 652 svchost.exe Token: SeCreatePagefilePrivilege 652 svchost.exe Token: SeShutdownPrivilege 652 svchost.exe Token: SeCreatePagefilePrivilege 652 svchost.exe Token: SeSecurityPrivilege 4944 TiWorker.exe Token: SeRestorePrivilege 4944 TiWorker.exe Token: SeBackupPrivilege 4944 TiWorker.exe Token: SeBackupPrivilege 4944 TiWorker.exe Token: SeRestorePrivilege 4944 TiWorker.exe Token: SeSecurityPrivilege 4944 TiWorker.exe Token: SeBackupPrivilege 4944 TiWorker.exe Token: SeRestorePrivilege 4944 TiWorker.exe Token: SeSecurityPrivilege 4944 TiWorker.exe Token: SeBackupPrivilege 4944 TiWorker.exe Token: SeRestorePrivilege 4944 TiWorker.exe Token: SeSecurityPrivilege 4944 TiWorker.exe Token: SeBackupPrivilege 4944 TiWorker.exe Token: SeRestorePrivilege 4944 TiWorker.exe Token: SeSecurityPrivilege 4944 TiWorker.exe Token: SeBackupPrivilege 4944 TiWorker.exe Token: SeRestorePrivilege 4944 TiWorker.exe Token: SeSecurityPrivilege 4944 TiWorker.exe Token: SeBackupPrivilege 4944 TiWorker.exe Token: SeRestorePrivilege 4944 TiWorker.exe Token: SeSecurityPrivilege 4944 TiWorker.exe Token: SeBackupPrivilege 4944 TiWorker.exe Token: SeRestorePrivilege 4944 TiWorker.exe Token: SeSecurityPrivilege 4944 TiWorker.exe Token: SeBackupPrivilege 4944 TiWorker.exe Token: SeRestorePrivilege 4944 TiWorker.exe Token: SeSecurityPrivilege 4944 TiWorker.exe Token: SeBackupPrivilege 4944 TiWorker.exe Token: SeRestorePrivilege 4944 TiWorker.exe Token: SeSecurityPrivilege 4944 TiWorker.exe Token: SeBackupPrivilege 4944 TiWorker.exe Token: SeRestorePrivilege 4944 TiWorker.exe Token: SeSecurityPrivilege 4944 TiWorker.exe Token: SeBackupPrivilege 4944 TiWorker.exe Token: SeRestorePrivilege 4944 TiWorker.exe Token: SeSecurityPrivilege 4944 TiWorker.exe Token: SeBackupPrivilege 4944 TiWorker.exe Token: SeRestorePrivilege 4944 TiWorker.exe Token: SeSecurityPrivilege 4944 TiWorker.exe Token: SeBackupPrivilege 4944 TiWorker.exe Token: SeRestorePrivilege 4944 TiWorker.exe Token: SeSecurityPrivilege 4944 TiWorker.exe Token: SeBackupPrivilege 4944 TiWorker.exe Token: SeRestorePrivilege 4944 TiWorker.exe Token: SeSecurityPrivilege 4944 TiWorker.exe Token: SeBackupPrivilege 4944 TiWorker.exe Token: SeRestorePrivilege 4944 TiWorker.exe Token: SeSecurityPrivilege 4944 TiWorker.exe Token: SeBackupPrivilege 4944 TiWorker.exe Token: SeRestorePrivilege 4944 TiWorker.exe Token: SeSecurityPrivilege 4944 TiWorker.exe Token: SeBackupPrivilege 4944 TiWorker.exe Token: SeRestorePrivilege 4944 TiWorker.exe Token: SeSecurityPrivilege 4944 TiWorker.exe Token: SeBackupPrivilege 4944 TiWorker.exe Token: SeRestorePrivilege 4944 TiWorker.exe Token: SeSecurityPrivilege 4944 TiWorker.exe Token: SeBackupPrivilege 4944 TiWorker.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\PO-098765MK.js1⤵
- Blocklisted process makes network request
- Drops startup file
PID:4552
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:652
-
C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exeC:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:4944