Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
09-08-2022 18:38
Static task
static1
Behavioral task
behavioral1
Sample
Quote_PDF.js
Resource
win7-20220718-en
General
-
Target
Quote_PDF.js
-
Size
592KB
-
MD5
edd15033148bf7e2bf4125c4d211e8ca
-
SHA1
bdb2ed893df770f57ef19cb2a6d2ffbac1fde78e
-
SHA256
c1a07cde2b35fc342b437b715d447a564db513a7c23223ba66f7d68da74d368d
-
SHA512
42d46d1607d1efa75e3ab540334afab109825209fdff8226f2e2a57a62c39df8c007995f93b3eae03567ea58b2ca5ce3b6e42baf6febb3658b7fb906fbe7cf4d
Malware Config
Signatures
-
NetWire RAT payload 4 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\Host Ip Js StartUp.exe netwire C:\Users\Admin\AppData\Roaming\Host Ip Js StartUp.exe netwire C:\Users\Admin\AppData\Roaming\Googlee\Notepad.exe netwire C:\Users\Admin\AppData\Roaming\Googlee\Notepad.exe netwire -
Blocklisted process makes network request 13 IoCs
Processes:
wscript.exewscript.exeflow pid process 9 4060 wscript.exe 10 1884 wscript.exe 19 1884 wscript.exe 25 4060 wscript.exe 39 4060 wscript.exe 44 4060 wscript.exe 45 1884 wscript.exe 56 4060 wscript.exe 57 1884 wscript.exe 69 4060 wscript.exe 77 1884 wscript.exe 85 4060 wscript.exe 87 1884 wscript.exe -
Executes dropped EXE 2 IoCs
Processes:
Host Ip Js StartUp.exeNotepad.exepid process 3296 Host Ip Js StartUp.exe 4924 Notepad.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
wscript.exeHost Ip Js StartUp.exewscript.exewscript.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1101907861-274115917-2188613224-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-1101907861-274115917-2188613224-1000\Control Panel\International\Geo\Nation Host Ip Js StartUp.exe Key value queried \REGISTRY\USER\S-1-5-21-1101907861-274115917-2188613224-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-1101907861-274115917-2188613224-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 5 IoCs
Processes:
wscript.exeNotepad.exewscript.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\juIwXhspQL.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Note.lnk Notepad.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\zyOjbguoaJ.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\zyOjbguoaJ.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\juIwXhspQL.js wscript.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
Notepad.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1101907861-274115917-2188613224-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ Notepad.exe Set value (str) \REGISTRY\USER\S-1-5-21-1101907861-274115917-2188613224-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\£2ëUíaÊ—KåL¦K®¨æ = "C:\\Users\\Admin\\AppData\\Roaming\\Googlee\\Notepad.exe" Notepad.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
wscript.exewscript.exewscript.exeHost Ip Js StartUp.exedescription pid process target process PID 3144 wrote to memory of 1884 3144 wscript.exe wscript.exe PID 3144 wrote to memory of 1884 3144 wscript.exe wscript.exe PID 3144 wrote to memory of 3296 3144 wscript.exe Host Ip Js StartUp.exe PID 3144 wrote to memory of 3296 3144 wscript.exe Host Ip Js StartUp.exe PID 3144 wrote to memory of 3296 3144 wscript.exe Host Ip Js StartUp.exe PID 1884 wrote to memory of 4060 1884 wscript.exe wscript.exe PID 1884 wrote to memory of 4060 1884 wscript.exe wscript.exe PID 4060 wrote to memory of 1348 4060 wscript.exe wscript.exe PID 4060 wrote to memory of 1348 4060 wscript.exe wscript.exe PID 3296 wrote to memory of 4924 3296 Host Ip Js StartUp.exe Notepad.exe PID 3296 wrote to memory of 4924 3296 Host Ip Js StartUp.exe Notepad.exe PID 3296 wrote to memory of 4924 3296 Host Ip Js StartUp.exe Notepad.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\Quote_PDF.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\zyOjbguoaJ.js"2⤵
- Blocklisted process makes network request
- Checks computer location settings
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\juIwXhspQL.js"3⤵
- Blocklisted process makes network request
- Checks computer location settings
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\oVKKrOdyJJ.js"4⤵PID:1348
-
C:\Users\Admin\AppData\Roaming\Host Ip Js StartUp.exe"C:\Users\Admin\AppData\Roaming\Host Ip Js StartUp.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3296 -
C:\Users\Admin\AppData\Roaming\Googlee\Notepad.exe"C:\Users\Admin\AppData\Roaming\Googlee\Notepad.exe"3⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
PID:4924
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
227KB
MD5fc6330d62ae89347dddf9e98d6dc2533
SHA1b2a3104e8178e25b6b40cf8b19d60c1a4e03e969
SHA25672c15ab989fb449e62d6a560bdad1c9c39d61c21345322b8c1331235adf484a7
SHA5121cf0e356a72a525b585533adab9c2abe1cfef9127ef96fedefe840bf33248bb85752fd92ca447cc6ac2b0654b497c07e3e3d0f0e064958f0f17b3e79424d6a4c
-
Filesize
227KB
MD5fc6330d62ae89347dddf9e98d6dc2533
SHA1b2a3104e8178e25b6b40cf8b19d60c1a4e03e969
SHA25672c15ab989fb449e62d6a560bdad1c9c39d61c21345322b8c1331235adf484a7
SHA5121cf0e356a72a525b585533adab9c2abe1cfef9127ef96fedefe840bf33248bb85752fd92ca447cc6ac2b0654b497c07e3e3d0f0e064958f0f17b3e79424d6a4c
-
Filesize
227KB
MD5fc6330d62ae89347dddf9e98d6dc2533
SHA1b2a3104e8178e25b6b40cf8b19d60c1a4e03e969
SHA25672c15ab989fb449e62d6a560bdad1c9c39d61c21345322b8c1331235adf484a7
SHA5121cf0e356a72a525b585533adab9c2abe1cfef9127ef96fedefe840bf33248bb85752fd92ca447cc6ac2b0654b497c07e3e3d0f0e064958f0f17b3e79424d6a4c
-
Filesize
227KB
MD5fc6330d62ae89347dddf9e98d6dc2533
SHA1b2a3104e8178e25b6b40cf8b19d60c1a4e03e969
SHA25672c15ab989fb449e62d6a560bdad1c9c39d61c21345322b8c1331235adf484a7
SHA5121cf0e356a72a525b585533adab9c2abe1cfef9127ef96fedefe840bf33248bb85752fd92ca447cc6ac2b0654b497c07e3e3d0f0e064958f0f17b3e79424d6a4c
-
Filesize
38KB
MD518a451d41d501f501013b82c8697083e
SHA1e31027858b8dd30339db29453791ab9552fd2e0f
SHA256ca93d14291d1ee81cc27df8fc1b55092cb0e819d37233f1e0ddb963c10288d0f
SHA51246c4b7c1bf9e1470a0ae244e56c10d2d4db97ed5102a3dea27501f1aff6528cd70b9b452348f0d53b935b3d222c8c1401df7537e5202105b09e2b013fb4cb6aa
-
Filesize
7KB
MD53706cdda45b9643a81251d011c39e8e5
SHA11dcfc53931935cc86a459302777845271cf3e175
SHA2563787d7284843c9fda5c95d75eb8bc16c4c0b92b0bd84d58b1bb0fb00905ee612
SHA51251967bdb3ab98e4389b46a0f6e5feb98fb6009b630820d8236ce920f5c04a3f710a4cd871aa0b10d8a6979a469cbb2d5954a7e13afe54d55a0621a8943c36d32
-
Filesize
103KB
MD5f6de6532bcb5dff519b1571779b99199
SHA1898302bf728cd7784a0f171722bf232c32ab3ed1
SHA256a5d8777e4d074fd73a97218850e0883b07945eb9eed084765181da209e608d3a
SHA51265fe6d05b64ecd93addb82c8cf9936357bf23bbd9540208c614cc6d78a4027824fdf987410adffd84407d18a9de7623b1396ce3fd8d96000af2849f7fc69d3b1