Resubmissions
28-11-2022 19:10
221128-xvd6ashh56 1028-11-2022 19:09
221128-xtsmashh23 1028-11-2022 15:04
221128-sf2wlacc29 10Analysis
-
max time kernel
282s -
max time network
299s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
28-11-2022 15:04
Static task
static1
Behavioral task
behavioral1
Sample
AS.js
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
AS.js
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
fix/adjutant.js
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
fix/adjutant.js
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
fix/hypersensitiveness.ps1
Resource
win7-20221111-en
Behavioral task
behavioral6
Sample
fix/hypersensitiveness.ps1
Resource
win10v2004-20221111-en
General
-
Target
AS.js
-
Size
143B
-
MD5
7249f0cf1e44e8e7a3642e2bbb0c0b1f
-
SHA1
49d2212ddc7444087928b7a4a2e2adb72febca85
-
SHA256
02049dd1dce83d87edaa23656c4327af83be55f67f793afac7203ac4c12a76e9
-
SHA512
b5b72aedc217c69ec6385f63575b8e0b77e35334ff673cf8a107b64f517bf762e8464da5c749c160576c26fa6b7198e62266dfd40d497daab3d535b7cee19296
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
wscript.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation wscript.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 1540 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
powershell.exepid process 2656 powershell.exe 2656 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 2656 powershell.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
wscript.exepowershell.exerundll32.exedescription pid process target process PID 3640 wrote to memory of 2656 3640 wscript.exe powershell.exe PID 3640 wrote to memory of 2656 3640 wscript.exe powershell.exe PID 2656 wrote to memory of 5040 2656 powershell.exe rundll32.exe PID 2656 wrote to memory of 5040 2656 powershell.exe rundll32.exe PID 5040 wrote to memory of 1540 5040 rundll32.exe rundll32.exe PID 5040 wrote to memory of 1540 5040 rundll32.exe rundll32.exe PID 5040 wrote to memory of 1540 5040 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\AS.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass fix\hypersensitiveness.ps12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\users\public\pickedKnelled.jpg DrawThemeIcon3⤵
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\users\public\pickedKnelled.jpg DrawThemeIcon4⤵
- Loads dropped DLL
PID:1540
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
472KB
MD54d3ca6ea1b0f9010a53a870f475c40ab
SHA159f1755050abcec7f5a3e4a217aeaaa7487ce32b
SHA2562bbe82d038bd24cc3e5e579f8a90e4229c6dff6a17fe0609caddfa045e18d36a
SHA51262a10a6f700e23167f9a34cde909b061d170d90aee159ba3f06de916290ccc7012060881ce68c7058878578a1ead5d14d1248a14800007eacc4e580648f1c19a
-
Filesize
472KB
MD54d3ca6ea1b0f9010a53a870f475c40ab
SHA159f1755050abcec7f5a3e4a217aeaaa7487ce32b
SHA2562bbe82d038bd24cc3e5e579f8a90e4229c6dff6a17fe0609caddfa045e18d36a
SHA51262a10a6f700e23167f9a34cde909b061d170d90aee159ba3f06de916290ccc7012060881ce68c7058878578a1ead5d14d1248a14800007eacc4e580648f1c19a