Analysis
-
max time kernel
146s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
18/12/2022, 10:14
Static task
static1
Behavioral task
behavioral1
Sample
test.js
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
test.js
Resource
win10v2004-20220812-en
General
-
Target
test.js
-
Size
609KB
-
MD5
0dd3d7d195a7d45f24c1f86c25b8bd73
-
SHA1
cb4142317dc5ca92ba2eee9aecc8809d34276ce4
-
SHA256
cc17a222a8b6e268ef29c4e4de39390b77f23fc6c45ea21dc9191ac45f15aea6
-
SHA512
63f0093605b0a4632a123dba5d999462025a6d99f9d2a310c53e0ab255526a297d3b370fae39c1f4b52ef1c591880fa90b0c45ab2fe8686f122c5c56b73023d0
-
SSDEEP
3072:vTwFRFxmzUmKvOERglXIjl7U0lVJSpHOcdKzPaKjaFeMXnsM4MkY9WZY5i/1RgHj:v+67ykgieRJ4Xp8Gl+stC/MxiP1YfoO
Malware Config
Signatures
-
Blocklisted process makes network request 33 IoCs
flow pid Process 6 4844 wscript.exe 7 3596 wscript.exe 8 1260 wscript.exe 27 4844 wscript.exe 59 4844 wscript.exe 71 4844 wscript.exe 77 1260 wscript.exe 78 3596 wscript.exe 81 4844 wscript.exe 87 4844 wscript.exe 89 4844 wscript.exe 95 4844 wscript.exe 96 1260 wscript.exe 97 3596 wscript.exe 98 4844 wscript.exe 100 4844 wscript.exe 101 4844 wscript.exe 102 4844 wscript.exe 103 1260 wscript.exe 104 3596 wscript.exe 105 4844 wscript.exe 107 4844 wscript.exe 108 4844 wscript.exe 109 4844 wscript.exe 110 1260 wscript.exe 111 3596 wscript.exe 112 4844 wscript.exe 113 4844 wscript.exe 114 4844 wscript.exe 115 4844 wscript.exe 116 1260 wscript.exe 117 3596 wscript.exe 118 4844 wscript.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 5 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\test.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ZVDUbxSgAX.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ZVDUbxSgAX.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\test.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ZVDUbxSgAX.js wscript.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\test = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\test.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\test = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\test.js\"" wscript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\test = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\test.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\test = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\test.js\"" wscript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3444 wrote to memory of 1260 3444 wscript.exe 80 PID 3444 wrote to memory of 1260 3444 wscript.exe 80 PID 3444 wrote to memory of 4844 3444 wscript.exe 81 PID 3444 wrote to memory of 4844 3444 wscript.exe 81 PID 4844 wrote to memory of 3596 4844 wscript.exe 82 PID 4844 wrote to memory of 3596 4844 wscript.exe 82
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\test.js1⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\ZVDUbxSgAX.js"2⤵
- Blocklisted process makes network request
- Drops startup file
PID:1260
-
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\test.js"2⤵
- Blocklisted process makes network request
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\ZVDUbxSgAX.js"3⤵
- Blocklisted process makes network request
- Drops startup file
PID:3596
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
209KB
MD5317f5e88c459ca95d712ff48993c684d
SHA1f88d0ab3a59a54a5902e96f4aa11f73f26b9a01f
SHA256a6d84d791efafee0828d9274a31dc208b93c2b662da97d6c32af5b03f74db296
SHA51249ab4dc8a5a8718bd9089681bca3ab27ab4de7c6d4875ceae34009a764c68ef6ed6a51a35b8b0f7e79e423538376639bf26ec264c0e6c5dd81248fd5ece33e0a
-
Filesize
609KB
MD50dd3d7d195a7d45f24c1f86c25b8bd73
SHA1cb4142317dc5ca92ba2eee9aecc8809d34276ce4
SHA256cc17a222a8b6e268ef29c4e4de39390b77f23fc6c45ea21dc9191ac45f15aea6
SHA51263f0093605b0a4632a123dba5d999462025a6d99f9d2a310c53e0ab255526a297d3b370fae39c1f4b52ef1c591880fa90b0c45ab2fe8686f122c5c56b73023d0
-
Filesize
209KB
MD5317f5e88c459ca95d712ff48993c684d
SHA1f88d0ab3a59a54a5902e96f4aa11f73f26b9a01f
SHA256a6d84d791efafee0828d9274a31dc208b93c2b662da97d6c32af5b03f74db296
SHA51249ab4dc8a5a8718bd9089681bca3ab27ab4de7c6d4875ceae34009a764c68ef6ed6a51a35b8b0f7e79e423538376639bf26ec264c0e6c5dd81248fd5ece33e0a
-
Filesize
209KB
MD5317f5e88c459ca95d712ff48993c684d
SHA1f88d0ab3a59a54a5902e96f4aa11f73f26b9a01f
SHA256a6d84d791efafee0828d9274a31dc208b93c2b662da97d6c32af5b03f74db296
SHA51249ab4dc8a5a8718bd9089681bca3ab27ab4de7c6d4875ceae34009a764c68ef6ed6a51a35b8b0f7e79e423538376639bf26ec264c0e6c5dd81248fd5ece33e0a
-
Filesize
609KB
MD50dd3d7d195a7d45f24c1f86c25b8bd73
SHA1cb4142317dc5ca92ba2eee9aecc8809d34276ce4
SHA256cc17a222a8b6e268ef29c4e4de39390b77f23fc6c45ea21dc9191ac45f15aea6
SHA51263f0093605b0a4632a123dba5d999462025a6d99f9d2a310c53e0ab255526a297d3b370fae39c1f4b52ef1c591880fa90b0c45ab2fe8686f122c5c56b73023d0