Analysis
-
max time kernel
189s -
max time network
196s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04-10-2022 19:18
Static task
static1
Behavioral task
behavioral1
Sample
CREDIT NOTE.js
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
CREDIT NOTE.js
Resource
win10v2004-20220812-en
General
-
Target
CREDIT NOTE.js
-
Size
47KB
-
MD5
771ee97bd2e61801d47f37b60a69d1c8
-
SHA1
b77ea83d939bc5ce8ceff9668488f8045ba58a0b
-
SHA256
25027a9677193ee152a6621382d40fcf31437b4366f6566d369f24d93f52f56d
-
SHA512
2ac19e006117d449467ec49f4b600293775bdbb0f03869a6e7c914449fb522d22f74ab060d0086ef1a033c91d987c38ddd97e258a7575581e95d68b1657737b1
-
SSDEEP
768:bH5hjkXAZJMdHG7TH8eA0oWz6nSwsmjX1uMW7/1W8eXBnKX2CzHsPOux4GsPje//:bH5hIwZ+dHk8n0ISwXZ8OBKX2yKCXlgT
Malware Config
Signatures
-
Blocklisted process makes network request 27 IoCs
flow pid Process 5 1396 wscript.exe 6 4936 wscript.exe 7 2512 wscript.exe 12 1396 wscript.exe 13 1396 wscript.exe 15 4936 wscript.exe 16 2512 wscript.exe 25 1396 wscript.exe 26 4936 wscript.exe 27 2512 wscript.exe 29 1396 wscript.exe 30 1396 wscript.exe 31 1396 wscript.exe 33 1396 wscript.exe 34 4936 wscript.exe 35 2512 wscript.exe 36 1396 wscript.exe 38 1396 wscript.exe 39 1396 wscript.exe 40 4936 wscript.exe 41 2512 wscript.exe 42 1396 wscript.exe 43 1396 wscript.exe 44 1396 wscript.exe 45 4936 wscript.exe 46 2512 wscript.exe 47 1396 wscript.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 5 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CREDIT NOTE.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CREDIT NOTE.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WjUZyzILPd.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WjUZyzILPd.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WjUZyzILPd.js wscript.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CREDIT NOTE = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\CREDIT NOTE.js\"" wscript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CREDIT NOTE = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\CREDIT NOTE.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CREDIT NOTE = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\CREDIT NOTE.js\"" wscript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CREDIT NOTE = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\CREDIT NOTE.js\"" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4756 wrote to memory of 2512 4756 wscript.exe 79 PID 4756 wrote to memory of 2512 4756 wscript.exe 79 PID 4756 wrote to memory of 1396 4756 wscript.exe 80 PID 4756 wrote to memory of 1396 4756 wscript.exe 80 PID 1396 wrote to memory of 4936 1396 wscript.exe 82 PID 1396 wrote to memory of 4936 1396 wscript.exe 82
Processes
-
C:\Windows\system32\wscript.exewscript.exe "C:\Users\Admin\AppData\Local\Temp\CREDIT NOTE.js"1⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\WjUZyzILPd.js"2⤵
- Blocklisted process makes network request
- Drops startup file
PID:2512
-
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\CREDIT NOTE.js"2⤵
- Blocklisted process makes network request
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\WjUZyzILPd.js"3⤵
- Blocklisted process makes network request
- Drops startup file
PID:4936
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
47KB
MD5771ee97bd2e61801d47f37b60a69d1c8
SHA1b77ea83d939bc5ce8ceff9668488f8045ba58a0b
SHA25625027a9677193ee152a6621382d40fcf31437b4366f6566d369f24d93f52f56d
SHA5122ac19e006117d449467ec49f4b600293775bdbb0f03869a6e7c914449fb522d22f74ab060d0086ef1a033c91d987c38ddd97e258a7575581e95d68b1657737b1
-
Filesize
47KB
MD5771ee97bd2e61801d47f37b60a69d1c8
SHA1b77ea83d939bc5ce8ceff9668488f8045ba58a0b
SHA25625027a9677193ee152a6621382d40fcf31437b4366f6566d369f24d93f52f56d
SHA5122ac19e006117d449467ec49f4b600293775bdbb0f03869a6e7c914449fb522d22f74ab060d0086ef1a033c91d987c38ddd97e258a7575581e95d68b1657737b1
-
Filesize
8KB
MD52f2198533289a4dac6f4406539f5b0f5
SHA1f37eef69eb03c33e41a0cbe2e3fcfb68070ccb58
SHA2562c9f6f3a3ee784722c588ff9bc72259461acc1084629364e44d479792c381bb4
SHA512cf791618aafeef05a5dd167e32746384f1ec8bb693735bcd7b1538e0ee988c76d4cd0235c951f24675045dcaebcf7d19fb3b8cb9d9ae76a4a1c695de23e612a5
-
Filesize
8KB
MD52f2198533289a4dac6f4406539f5b0f5
SHA1f37eef69eb03c33e41a0cbe2e3fcfb68070ccb58
SHA2562c9f6f3a3ee784722c588ff9bc72259461acc1084629364e44d479792c381bb4
SHA512cf791618aafeef05a5dd167e32746384f1ec8bb693735bcd7b1538e0ee988c76d4cd0235c951f24675045dcaebcf7d19fb3b8cb9d9ae76a4a1c695de23e612a5