Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
01-08-2022 07:17
Static task
static1
Behavioral task
behavioral1
Sample
Quote.js
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
Quote.js
Resource
win10v2004-20220721-en
General
-
Target
Quote.js
-
Size
412KB
-
MD5
36fd158eb019ac0d3b29754770aae398
-
SHA1
b3421f16e3f6a7defed1cfd4c7e7ad0b71d00d81
-
SHA256
31c05b8aacf0b417ecf6b3f3ddc88f18505a790e0a9a13186982789abf25875c
-
SHA512
299a312eb5e572485e071374e3912acd2dc3be41e1b8b481b424c94c05f478570a293579814a3b9f3e767eec0d1eb9c3a662d5c927f673c96cd13a8c0aa75f0f
Malware Config
Signatures
-
NetWire RAT payload 4 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\Host Ip Js StartUp.exe netwire C:\Users\Admin\AppData\Roaming\Host Ip Js StartUp.exe netwire C:\Users\Admin\AppData\Roaming\Googlee\Notepad.exe netwire C:\Users\Admin\AppData\Roaming\Googlee\Notepad.exe netwire -
Executes dropped EXE 2 IoCs
Processes:
Host Ip Js StartUp.exeNotepad.exepid process 644 Host Ip Js StartUp.exe 4408 Notepad.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
wscript.exeHost Ip Js StartUp.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1101907861-274115917-2188613224-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-1101907861-274115917-2188613224-1000\Control Panel\International\Geo\Nation Host Ip Js StartUp.exe -
Drops startup file 1 IoCs
Processes:
Notepad.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Note.lnk Notepad.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
Notepad.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1101907861-274115917-2188613224-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ Notepad.exe Set value (str) \REGISTRY\USER\S-1-5-21-1101907861-274115917-2188613224-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\£2ëUíaÊ—KåL¦K®¨æ = "C:\\Users\\Admin\\AppData\\Roaming\\Googlee\\Notepad.exe" Notepad.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
wscript.exeHost Ip Js StartUp.exeNotepad.execmd.exedescription pid process target process PID 4232 wrote to memory of 4160 4232 wscript.exe wscript.exe PID 4232 wrote to memory of 4160 4232 wscript.exe wscript.exe PID 4232 wrote to memory of 644 4232 wscript.exe Host Ip Js StartUp.exe PID 4232 wrote to memory of 644 4232 wscript.exe Host Ip Js StartUp.exe PID 4232 wrote to memory of 644 4232 wscript.exe Host Ip Js StartUp.exe PID 644 wrote to memory of 4408 644 Host Ip Js StartUp.exe Notepad.exe PID 644 wrote to memory of 4408 644 Host Ip Js StartUp.exe Notepad.exe PID 644 wrote to memory of 4408 644 Host Ip Js StartUp.exe Notepad.exe PID 4408 wrote to memory of 3184 4408 Notepad.exe cmd.exe PID 4408 wrote to memory of 3184 4408 Notepad.exe cmd.exe PID 4408 wrote to memory of 3184 4408 Notepad.exe cmd.exe PID 3184 wrote to memory of 4364 3184 cmd.exe PING.EXE PID 3184 wrote to memory of 4364 3184 cmd.exe PING.EXE PID 3184 wrote to memory of 4364 3184 cmd.exe PING.EXE
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\Quote.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\pwhQXOgJoL.js"2⤵PID:4160
-
C:\Users\Admin\AppData\Roaming\Host Ip Js StartUp.exe"C:\Users\Admin\AppData\Roaming\Host Ip Js StartUp.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:644 -
C:\Users\Admin\AppData\Roaming\Googlee\Notepad.exe"C:\Users\Admin\AppData\Roaming\Googlee\Notepad.exe"3⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Roaming\Googlee\Notepad.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30005⤵
- Runs ping.exe
PID:4364
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
227KB
MD5fc6330d62ae89347dddf9e98d6dc2533
SHA1b2a3104e8178e25b6b40cf8b19d60c1a4e03e969
SHA25672c15ab989fb449e62d6a560bdad1c9c39d61c21345322b8c1331235adf484a7
SHA5121cf0e356a72a525b585533adab9c2abe1cfef9127ef96fedefe840bf33248bb85752fd92ca447cc6ac2b0654b497c07e3e3d0f0e064958f0f17b3e79424d6a4c
-
Filesize
227KB
MD5fc6330d62ae89347dddf9e98d6dc2533
SHA1b2a3104e8178e25b6b40cf8b19d60c1a4e03e969
SHA25672c15ab989fb449e62d6a560bdad1c9c39d61c21345322b8c1331235adf484a7
SHA5121cf0e356a72a525b585533adab9c2abe1cfef9127ef96fedefe840bf33248bb85752fd92ca447cc6ac2b0654b497c07e3e3d0f0e064958f0f17b3e79424d6a4c
-
Filesize
227KB
MD5fc6330d62ae89347dddf9e98d6dc2533
SHA1b2a3104e8178e25b6b40cf8b19d60c1a4e03e969
SHA25672c15ab989fb449e62d6a560bdad1c9c39d61c21345322b8c1331235adf484a7
SHA5121cf0e356a72a525b585533adab9c2abe1cfef9127ef96fedefe840bf33248bb85752fd92ca447cc6ac2b0654b497c07e3e3d0f0e064958f0f17b3e79424d6a4c
-
Filesize
227KB
MD5fc6330d62ae89347dddf9e98d6dc2533
SHA1b2a3104e8178e25b6b40cf8b19d60c1a4e03e969
SHA25672c15ab989fb449e62d6a560bdad1c9c39d61c21345322b8c1331235adf484a7
SHA5121cf0e356a72a525b585533adab9c2abe1cfef9127ef96fedefe840bf33248bb85752fd92ca447cc6ac2b0654b497c07e3e3d0f0e064958f0f17b3e79424d6a4c
-
Filesize
2KB
MD50069b15d5047fb7bb498de58bfa8ec88
SHA1d834c8ea6bc8335804928593794bbace9a49f30f
SHA256c4f0895a1ed38abdb19e2f9d957064b8821ef52f80147e47a801fc57ee5f3e0b
SHA512c8d5b4f056812b4b1efaf7716cb320bdfa705271e1cd6a12474ae091ba5685214dd3ae78edd5d70e1295d8f449afec58c0ff3f1dc35aec3ed0b5184314bfec9e