Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
18/12/2022, 10:46
Static task
static1
Behavioral task
behavioral1
Sample
test.js
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
test.js
Resource
win10v2004-20221111-en
General
-
Target
test.js
-
Size
609KB
-
MD5
0dd3d7d195a7d45f24c1f86c25b8bd73
-
SHA1
cb4142317dc5ca92ba2eee9aecc8809d34276ce4
-
SHA256
cc17a222a8b6e268ef29c4e4de39390b77f23fc6c45ea21dc9191ac45f15aea6
-
SHA512
63f0093605b0a4632a123dba5d999462025a6d99f9d2a310c53e0ab255526a297d3b370fae39c1f4b52ef1c591880fa90b0c45ab2fe8686f122c5c56b73023d0
-
SSDEEP
3072:vTwFRFxmzUmKvOERglXIjl7U0lVJSpHOcdKzPaKjaFeMXnsM4MkY9WZY5i/1RgHj:v+67ykgieRJ4Xp8Gl+stC/MxiP1YfoO
Malware Config
Signatures
-
Blocklisted process makes network request 33 IoCs
flow pid Process 6 1028 wscript.exe 7 1672 wscript.exe 8 1084 wscript.exe 15 1672 wscript.exe 21 1672 wscript.exe 22 1672 wscript.exe 26 1028 wscript.exe 30 1084 wscript.exe 34 1672 wscript.exe 36 1672 wscript.exe 38 1672 wscript.exe 45 1672 wscript.exe 48 1028 wscript.exe 49 1084 wscript.exe 50 1672 wscript.exe 53 1672 wscript.exe 54 1672 wscript.exe 55 1672 wscript.exe 56 1028 wscript.exe 57 1084 wscript.exe 58 1672 wscript.exe 60 1672 wscript.exe 61 1672 wscript.exe 62 1672 wscript.exe 63 1028 wscript.exe 64 1084 wscript.exe 65 1672 wscript.exe 66 1672 wscript.exe 67 1672 wscript.exe 68 1672 wscript.exe 69 1028 wscript.exe 70 1084 wscript.exe 71 1672 wscript.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 5 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\test.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ZVDUbxSgAX.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ZVDUbxSgAX.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\test.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ZVDUbxSgAX.js wscript.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\test = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\test.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\test = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\test.js\"" wscript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\test = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\test.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\test = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\test.js\"" wscript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4784 wrote to memory of 1028 4784 wscript.exe 81 PID 4784 wrote to memory of 1028 4784 wscript.exe 81 PID 4784 wrote to memory of 1672 4784 wscript.exe 82 PID 4784 wrote to memory of 1672 4784 wscript.exe 82 PID 1672 wrote to memory of 1084 1672 wscript.exe 83 PID 1672 wrote to memory of 1084 1672 wscript.exe 83
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\test.js1⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\ZVDUbxSgAX.js"2⤵
- Blocklisted process makes network request
- Drops startup file
PID:1028
-
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\test.js"2⤵
- Blocklisted process makes network request
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\ZVDUbxSgAX.js"3⤵
- Blocklisted process makes network request
- Drops startup file
PID:1084
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
209KB
MD5317f5e88c459ca95d712ff48993c684d
SHA1f88d0ab3a59a54a5902e96f4aa11f73f26b9a01f
SHA256a6d84d791efafee0828d9274a31dc208b93c2b662da97d6c32af5b03f74db296
SHA51249ab4dc8a5a8718bd9089681bca3ab27ab4de7c6d4875ceae34009a764c68ef6ed6a51a35b8b0f7e79e423538376639bf26ec264c0e6c5dd81248fd5ece33e0a
-
Filesize
609KB
MD50dd3d7d195a7d45f24c1f86c25b8bd73
SHA1cb4142317dc5ca92ba2eee9aecc8809d34276ce4
SHA256cc17a222a8b6e268ef29c4e4de39390b77f23fc6c45ea21dc9191ac45f15aea6
SHA51263f0093605b0a4632a123dba5d999462025a6d99f9d2a310c53e0ab255526a297d3b370fae39c1f4b52ef1c591880fa90b0c45ab2fe8686f122c5c56b73023d0
-
Filesize
209KB
MD5317f5e88c459ca95d712ff48993c684d
SHA1f88d0ab3a59a54a5902e96f4aa11f73f26b9a01f
SHA256a6d84d791efafee0828d9274a31dc208b93c2b662da97d6c32af5b03f74db296
SHA51249ab4dc8a5a8718bd9089681bca3ab27ab4de7c6d4875ceae34009a764c68ef6ed6a51a35b8b0f7e79e423538376639bf26ec264c0e6c5dd81248fd5ece33e0a
-
Filesize
209KB
MD5317f5e88c459ca95d712ff48993c684d
SHA1f88d0ab3a59a54a5902e96f4aa11f73f26b9a01f
SHA256a6d84d791efafee0828d9274a31dc208b93c2b662da97d6c32af5b03f74db296
SHA51249ab4dc8a5a8718bd9089681bca3ab27ab4de7c6d4875ceae34009a764c68ef6ed6a51a35b8b0f7e79e423538376639bf26ec264c0e6c5dd81248fd5ece33e0a
-
Filesize
609KB
MD50dd3d7d195a7d45f24c1f86c25b8bd73
SHA1cb4142317dc5ca92ba2eee9aecc8809d34276ce4
SHA256cc17a222a8b6e268ef29c4e4de39390b77f23fc6c45ea21dc9191ac45f15aea6
SHA51263f0093605b0a4632a123dba5d999462025a6d99f9d2a310c53e0ab255526a297d3b370fae39c1f4b52ef1c591880fa90b0c45ab2fe8686f122c5c56b73023d0