Analysis
-
max time kernel
150s -
max time network
187s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-05-2022 15:50
Static task
static1
Behavioral task
behavioral1
Sample
97c97ad2baef37eea023549131c192f441aa7976747166cd31095e7dad17948c.js
Resource
win7-20220414-en
General
-
Target
97c97ad2baef37eea023549131c192f441aa7976747166cd31095e7dad17948c.js
-
Size
19KB
-
MD5
f226dbe5dc77fe071ffc8c5d3c82e424
-
SHA1
b4a63bd81c5388390dbda8b92770da88581610d1
-
SHA256
97c97ad2baef37eea023549131c192f441aa7976747166cd31095e7dad17948c
-
SHA512
11303231b6f854588cf182933af31f54060244cc4a8dbb73e41e3fca673b2c7d33457513d131c098808b60db8ebbaa6acd394d9b458fe1e2dc9c090fe02b9251
Malware Config
Signatures
-
EvilNum JS Component 2 IoCs
resource yara_rule behavioral1/files/0x000a0000000122ee-56.dat evilnum_js behavioral1/files/0x00090000000122fa-59.dat evilnum_js -
Deletes itself 1 IoCs
pid Process 1104 wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000850f07ecb424934d8f5a48a59e73cec00000000002000000000010660000000100002000000011da749a4b887d0ff44268e3c16947c01736b04ec2e483d276796dfb057df0f0000000000e8000000002000020000000fa587804dd02ebf3804ef009c78c1204c4b665580df672a91d251bdf51e62fac200000004e9663363cda1eb8a0478acce436654119d3a0f22fd0bb4f6b57d2ec4a866703400000009e1267250b921ab083850f1837cfbcc6face64cffc629e33b932c6652814065e1f29383577bceb4257cb4b4aae40f7ffa58c87f55351b11e6a00af6e7f600d94 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "359835448" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0f9028f756cd801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AF768021-D868-11EC-B1DF-6AE7990DC39D} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 432 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 432 iexplore.exe 432 iexplore.exe 1580 IEXPLORE.EXE 1580 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1104 wrote to memory of 2016 1104 wscript.exe 28 PID 1104 wrote to memory of 2016 1104 wscript.exe 28 PID 1104 wrote to memory of 2016 1104 wscript.exe 28 PID 2016 wrote to memory of 592 2016 cscript.exe 31 PID 2016 wrote to memory of 592 2016 cscript.exe 31 PID 2016 wrote to memory of 592 2016 cscript.exe 31 PID 592 wrote to memory of 1560 592 cscript.exe 33 PID 592 wrote to memory of 1560 592 cscript.exe 33 PID 592 wrote to memory of 1560 592 cscript.exe 33 PID 592 wrote to memory of 1944 592 cscript.exe 35 PID 592 wrote to memory of 1944 592 cscript.exe 35 PID 592 wrote to memory of 1944 592 cscript.exe 35 PID 592 wrote to memory of 1748 592 cscript.exe 36 PID 592 wrote to memory of 1748 592 cscript.exe 36 PID 592 wrote to memory of 1748 592 cscript.exe 36 PID 432 wrote to memory of 1580 432 iexplore.exe 41 PID 432 wrote to memory of 1580 432 iexplore.exe 41 PID 432 wrote to memory of 1580 432 iexplore.exe 41 PID 432 wrote to memory of 1580 432 iexplore.exe 41
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\97c97ad2baef37eea023549131c192f441aa7976747166cd31095e7dad17948c.js1⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Windows\System32\cscript.exe"C:\Windows\System32\cscript.exe" C:\ProgramData\Assistance\Assistance.js2⤵
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\System32\cscript.exe"C:\Windows\System32\cscript.exe" C:\Users\Admin\AppData\Local\Temp\reportapi.js3⤵
- Suspicious use of WriteProcessMemory
PID:592 -
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" import C:\ProgramData\Assistance\AssistanceIE.reg4⤵PID:1560
-
-
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" import C:\ProgramData\Assistance\Assistance.reg4⤵PID:1944
-
-
C:\Windows\System32\cscript.exe"C:\Windows\System32\cscript.exe" C:\Users\Admin\AppData\Local\Temp\reportapi.js4⤵PID:1748
-
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -startmediumtab -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:432 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1580
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19KB
MD5f226dbe5dc77fe071ffc8c5d3c82e424
SHA1b4a63bd81c5388390dbda8b92770da88581610d1
SHA25697c97ad2baef37eea023549131c192f441aa7976747166cd31095e7dad17948c
SHA51211303231b6f854588cf182933af31f54060244cc4a8dbb73e41e3fca673b2c7d33457513d131c098808b60db8ebbaa6acd394d9b458fe1e2dc9c090fe02b9251
-
Filesize
180B
MD59f6c27491c261d863fac798c0bacccc7
SHA11cba060165473420f1f671f00c36169f32abc705
SHA256c44db0cd3d6973be77fe8f8f7e822d3ff1d7868c77fba9835e226407a1f0f923
SHA51265ac8569cc1d17067a7c7b9223fc580738769351f3682eb4efc71a81acaaf74244f875675fce82642e89ec30b2b5e241c9108644db4f387a568fb05fe5fe5fa0
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ce0fca1012dda17f6086f6ba0ccc228
SHA1265ac1c9582c5b2255503ae589bcf4e01014a056
SHA25632f34b582e1e0c0908957914d22002a183bd530bdd6537b907937eb7c9e62fd5
SHA5122a46103c48e63d163c2e71b8c336344d94d5f4564c0ad8edf3259c70fd71364f43a3632d41868eb17ba90098255fad0d23a3e3d4ead986fe547077ab6bb01971
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5906479a899bd0db8705b1d0c059ad18d
SHA18b86b3b300ef10cabd38f17c3d8b4d054a1ed28a
SHA25629319c007dc83b4bb46cdd173cb9f2a9e508c37afcf2ce18af2839efa005c73f
SHA51298466fff9c5b8e8df83396d4dcfb0701a4889484662286159a6b491e6dabb85f0ce7a7418838d0c585753f5206835c6c636f0c90e22f3dfaa04567a3d564bedd
-
Filesize
4KB
MD50d24d9f0ad20eae19630f7a32327ae70
SHA1681d6bd252a5d8ae8c4fd289372f6048ece6cc12
SHA2565063002e64d992adf5cffe9a5e268018bbb3af62dc2e42d81d462cfc51889e74
SHA5121dcaa3d83aad6b009119eddfe6c609f4e51ccfc37bbe3f1e01ed49e42fcd01809f127033e4476fc034390ee77f4a30da007b955ba666f830a0afe858d4a70540
-
Filesize
9KB
MD5071b463f3f6eeeff8e6e57883a5ca389
SHA124f07a678c80d0a57a42a8cd6ed0138e4a6b620d
SHA25686ea557203d01c6f75e5bfb52285e22dafb51997d01825b50b05c3df5418e1d1
SHA51204363175267507ef2043fe36741947387710a87cbb362b59fcdbd18a51af6d96c5c7a43cdf4a160da7466bfe7851879b5bb3e9f766b1b2ba292b12fa41225ca2
-
Filesize
10KB
MD5d73725196e9d76aa34aeee0ddf5ff3be
SHA15d8de2da2cdcd66fddfd6a89a8acb460358b2573
SHA25637c602d9284a2669b0447adc9a799735cf8dd9b380165a81ea915fcf9f4ae0e6
SHA5127f9b1fc337cf734eb255479f93c93204aaec5bd06ad6e80f6324444d890a796e4857358da91c9ce37bf7da7e235487a47e82d7791e320cb08981b7bf13650414
-
Filesize
11KB
MD5a00fb7ec5b3ea0f9ab8a9853d17c5f4c
SHA1b59cf7f008e3ac5f2171905368fe626786c917cc
SHA256dd0e57a672476656183499b5d781a8507bb13016ae78223e27e473a1febe528e
SHA512e5f386ab95ab4816073d9daa854ec2198cd1aebf1c6891c7a6705155ca161d08483bc400926808403cba38f27a9917884c98f038397b4b69ca09af99e0b2d12e
-
Filesize
751B
MD5e14cbb0ced8b231a3dd97cf8bd9f1f55
SHA127de89ed08538f017d32b334a311d54d6859ed6d
SHA256aa386dc2f66e2527766f50f5dd75f023550725ea8afc68593a596c41620265bc
SHA512d9225061f5b2d8a151cbde88c70fa979a527b296b2ec192f210db574d85f6449d43dfa960a905d81d0b3d2c9eb0e5bcb300e7935734588667834477f5cbfdd8c
-
Filesize
19KB
MD5f226dbe5dc77fe071ffc8c5d3c82e424
SHA1b4a63bd81c5388390dbda8b92770da88581610d1
SHA25697c97ad2baef37eea023549131c192f441aa7976747166cd31095e7dad17948c
SHA51211303231b6f854588cf182933af31f54060244cc4a8dbb73e41e3fca673b2c7d33457513d131c098808b60db8ebbaa6acd394d9b458fe1e2dc9c090fe02b9251
-
Filesize
603B
MD5cdd19763943ba84c4cea3b04175bacab
SHA17d15e1768ea2c157d3075ac4fa6a7e29670f401e
SHA256381a6e5d40a70ab38be2dae7524eb7699522eeb021949a6e13d1591681fc4778
SHA51249da968c516afdb8403449b12767b7714a8c1d0952c8fa1766f3467e510c21812656a60d4af1571dbfbc693b3280c80dc23073c004fee6e09da0cffaba7b13aa