Analysis
-
max time kernel
130s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 07:03
Static task
static1
Behavioral task
behavioral1
Sample
AWB NO - 3806763435.jar
Resource
win7-20221111-en
General
-
Target
AWB NO - 3806763435.jar
-
Size
135KB
-
MD5
f3ea82bc0cc2257700a03772803f33ba
-
SHA1
4a3b8f5db62c2b8da10c12f303c793d4c906154c
-
SHA256
637d0ad48e3a475f7b025f1c9fe9baf21644f56e8cb80191b442cadb4fdd9ca6
-
SHA512
09a18567c0955b0a0a8e626d5bd8e7fd92229276cd750a07788a14ad8ab9ff86a1f86e6e601e49bac1ba5f0c3c6cb70aa56eb18381fee0557c760c5f7949c798
-
SSDEEP
3072:mf6XMlidasMjimQsBqUDt/Gsz8DSXyKlQwy:mf6XKisgmQsB5tlBXyKlQwy
Malware Config
Signatures
-
Blocklisted process makes network request 5 IoCs
Processes:
WScript.exeflow pid process 19 4380 WScript.exe 40 4380 WScript.exe 46 4380 WScript.exe 49 4380 WScript.exe 50 4380 WScript.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
wscript.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 2 IoCs
Processes:
WScript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UbAiBlUvAZ.js WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UbAiBlUvAZ.js WScript.exe -
Drops file in Program Files directory 12 IoCs
Processes:
javaw.exedescription ioc process File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\server\symbols\dll\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\dll\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\symbols\dll\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\dll\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\symbols\dll\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\server\dll\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\server\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\server\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\server\dll\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\server\symbols\dll\jvm.pdb javaw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
Processes:
wscript.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings wscript.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
java.exewscript.exedescription pid process target process PID 3616 wrote to memory of 2416 3616 java.exe wscript.exe PID 3616 wrote to memory of 2416 3616 java.exe wscript.exe PID 2416 wrote to memory of 4380 2416 wscript.exe WScript.exe PID 2416 wrote to memory of 4380 2416 wscript.exe WScript.exe PID 2416 wrote to memory of 3260 2416 wscript.exe javaw.exe PID 2416 wrote to memory of 3260 2416 wscript.exe javaw.exe
Processes
-
C:\ProgramData\Oracle\Java\javapath\java.exejava -jar "C:\Users\Admin\AppData\Local\Temp\AWB NO - 3806763435.jar"1⤵
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Windows\SYSTEM32\wscript.exewscript C:\Users\Admin\fcttazxkll.js2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\UbAiBlUvAZ.js"3⤵
- Blocklisted process makes network request
- Drops startup file
PID:4380 -
C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe"C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\fcymhfmvy.txt"3⤵
- Drops file in Program Files directory
PID:3260
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
50B
MD5032fec3920b718947834f7460d17f409
SHA1ff8ac1238efcabea4255454dd0e5a2ec97cefc53
SHA256756401cd7ff3e9d1a6a51b7d332a1d6b1925577154a9dbed61ff4b2547753317
SHA512952b5ab88afb7d1a5fe51b47b69664ab0ceb06868f5c0418342831b96efb33b54ff19b2fedd5d02683fe329d83bdce944367fa751180e5213359e79e885b73fe
-
Filesize
23KB
MD5c53fc2f411c2a1b4742db917bd10708f
SHA1d34fcd46c30ab1d8d6b21535f63f420f536154a6
SHA256d2aefa366d202443a0250d5bc93802230486b3990dce7c12b419be570818c67a
SHA5127aee8c96b0c7c4c974b1be1379ab1d8a10a3f444cd36d68c6684ac2a540ec15210ea247d3f04be7e4251d0e4da1cff14503406b5778f6cae310fbcac283663ae
-
Filesize
91KB
MD53bbdbc10682111317bef9f19b6dbb95e
SHA1135efb10366e837601e01cec75999662abb87a80
SHA2569045fd0a805e07c7e6367fb3cb62f8121964056894cee3b56f6f85feddce92f7
SHA512858f62f75d3eb1c4f7fbef9c92cd10e26e5326484e5557a7e1a6bb140413470c2364b0f44383a166e3517d1d759775c17baa46560bf13768850cf3b1573b1170
-
Filesize
240KB
MD5acad0bd0c33f21939a775ce90b38d4e2
SHA15b3c2c7723b4bbc3185be8a74d1cde81a60fa1a1
SHA256168c84c8a36ea84c39cc8380447d4c81227f924ed80bcaa432f34116a87b63ab
SHA5129e8572be372134639e9ddf88c832cd17d7a03882e3389bedd1a32845851ad189edb26354f06cf563a2d8101b4eb31426a7566e4ab3cc798b78a6869b525368b4