Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2022, 23:54
Static task
static1
Behavioral task
behavioral1
Sample
5597f148d24f8999fa0e961445c95d0b854a8c296a46cb92db48ddbc1ecc341f.js
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5597f148d24f8999fa0e961445c95d0b854a8c296a46cb92db48ddbc1ecc341f.js
Resource
win10v2004-20221111-en
General
-
Target
5597f148d24f8999fa0e961445c95d0b854a8c296a46cb92db48ddbc1ecc341f.js
-
Size
1.1MB
-
MD5
38384d69c165b100f3e0bb9628feab41
-
SHA1
e5d43d8c4e69c1b11eb0e98bef644440e7a1ea5a
-
SHA256
5597f148d24f8999fa0e961445c95d0b854a8c296a46cb92db48ddbc1ecc341f
-
SHA512
e0cd055fd8dbcbeca87826e5f91ffdcc5b2aed225a9aa6136d1ee9538d9ca2d4ec9fe8d7d50bb9acaddb475b789c5cd9bbd9f78d0f3b8aa5074fd911f5672d3b
-
SSDEEP
12288:GtHYDeDuDLzi5Zvhxuw/9qfuu7u0mqY4KjqjxXlb67SlkEbDVk:Y7xp9qfuu7u0mqY4K+SmlkEXVk
Malware Config
Signatures
-
Blocklisted process makes network request 54 IoCs
flow pid Process 5 4824 wscript.exe 7 2948 wscript.exe 8 4156 wscript.exe 10 4156 wscript.exe 21 4156 wscript.exe 22 4824 wscript.exe 23 2948 wscript.exe 29 4156 wscript.exe 30 4824 wscript.exe 31 2948 wscript.exe 32 4156 wscript.exe 34 4824 wscript.exe 35 2948 wscript.exe 40 4156 wscript.exe 46 4156 wscript.exe 47 4824 wscript.exe 48 2948 wscript.exe 52 4156 wscript.exe 54 4824 wscript.exe 55 2948 wscript.exe 56 4156 wscript.exe 57 4824 wscript.exe 58 2948 wscript.exe 59 4156 wscript.exe 62 4156 wscript.exe 63 4824 wscript.exe 64 2948 wscript.exe 66 4156 wscript.exe 67 4824 wscript.exe 68 2948 wscript.exe 69 4156 wscript.exe 70 4824 wscript.exe 71 2948 wscript.exe 72 4156 wscript.exe 73 4156 wscript.exe 74 4824 wscript.exe 75 2948 wscript.exe 76 4156 wscript.exe 77 4824 wscript.exe 78 2948 wscript.exe 79 4156 wscript.exe 80 4824 wscript.exe 81 2948 wscript.exe 82 4156 wscript.exe 85 4824 wscript.exe 86 2948 wscript.exe 87 4156 wscript.exe 88 4156 wscript.exe 89 4824 wscript.exe 90 2948 wscript.exe 91 4156 wscript.exe 92 4824 wscript.exe 93 2948 wscript.exe 94 4156 wscript.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 5 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\5597f148d24f8999fa0e961445c95d0b854a8c296a46cb92db48ddbc1ecc341f.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cGgozkzQYb.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cGgozkzQYb.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\5597f148d24f8999fa0e961445c95d0b854a8c296a46cb92db48ddbc1ecc341f.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cGgozkzQYb.js wscript.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\5597f148d24f8999fa0e961445c95d0b854a8c296a46cb92db48ddbc1ecc341f = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\5597f148d24f8999fa0e961445c95d0b854a8c296a46cb92db48ddbc1ecc341f.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\5597f148d24f8999fa0e961445c95d0b854a8c296a46cb92db48ddbc1ecc341f = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\5597f148d24f8999fa0e961445c95d0b854a8c296a46cb92db48ddbc1ecc341f.js\"" wscript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\5597f148d24f8999fa0e961445c95d0b854a8c296a46cb92db48ddbc1ecc341f = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\5597f148d24f8999fa0e961445c95d0b854a8c296a46cb92db48ddbc1ecc341f.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\5597f148d24f8999fa0e961445c95d0b854a8c296a46cb92db48ddbc1ecc341f = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\5597f148d24f8999fa0e961445c95d0b854a8c296a46cb92db48ddbc1ecc341f.js\"" wscript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3936 wrote to memory of 4824 3936 wscript.exe 80 PID 3936 wrote to memory of 4824 3936 wscript.exe 80 PID 3936 wrote to memory of 4156 3936 wscript.exe 81 PID 3936 wrote to memory of 4156 3936 wscript.exe 81 PID 4156 wrote to memory of 2948 4156 wscript.exe 82 PID 4156 wrote to memory of 2948 4156 wscript.exe 82
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\5597f148d24f8999fa0e961445c95d0b854a8c296a46cb92db48ddbc1ecc341f.js1⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\cGgozkzQYb.js"2⤵
- Blocklisted process makes network request
- Drops startup file
PID:4824
-
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\5597f148d24f8999fa0e961445c95d0b854a8c296a46cb92db48ddbc1ecc341f.js"2⤵
- Blocklisted process makes network request
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\cGgozkzQYb.js"3⤵
- Blocklisted process makes network request
- Drops startup file
PID:2948
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD538384d69c165b100f3e0bb9628feab41
SHA1e5d43d8c4e69c1b11eb0e98bef644440e7a1ea5a
SHA2565597f148d24f8999fa0e961445c95d0b854a8c296a46cb92db48ddbc1ecc341f
SHA512e0cd055fd8dbcbeca87826e5f91ffdcc5b2aed225a9aa6136d1ee9538d9ca2d4ec9fe8d7d50bb9acaddb475b789c5cd9bbd9f78d0f3b8aa5074fd911f5672d3b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\5597f148d24f8999fa0e961445c95d0b854a8c296a46cb92db48ddbc1ecc341f.js
Filesize1.1MB
MD538384d69c165b100f3e0bb9628feab41
SHA1e5d43d8c4e69c1b11eb0e98bef644440e7a1ea5a
SHA2565597f148d24f8999fa0e961445c95d0b854a8c296a46cb92db48ddbc1ecc341f
SHA512e0cd055fd8dbcbeca87826e5f91ffdcc5b2aed225a9aa6136d1ee9538d9ca2d4ec9fe8d7d50bb9acaddb475b789c5cd9bbd9f78d0f3b8aa5074fd911f5672d3b
-
Filesize
299KB
MD5e25921817f40444325fb0903c802f7e8
SHA11378235074917b2322409957a81de7cc13cc516d
SHA25651f3bdda25cd5c326a09abfbbe09b17cc71d5693a4d5650bb6d5a7a73980095a
SHA51224c2c7dc61ddd95c55b69a29b7cf3b8336d24eabc0cd89b4639d701851508265564d53b4fa4db2f48a1aa770919983820474e79f8f6d2868755996c30a35ada2
-
Filesize
299KB
MD5e25921817f40444325fb0903c802f7e8
SHA11378235074917b2322409957a81de7cc13cc516d
SHA25651f3bdda25cd5c326a09abfbbe09b17cc71d5693a4d5650bb6d5a7a73980095a
SHA51224c2c7dc61ddd95c55b69a29b7cf3b8336d24eabc0cd89b4639d701851508265564d53b4fa4db2f48a1aa770919983820474e79f8f6d2868755996c30a35ada2
-
Filesize
299KB
MD5e25921817f40444325fb0903c802f7e8
SHA11378235074917b2322409957a81de7cc13cc516d
SHA25651f3bdda25cd5c326a09abfbbe09b17cc71d5693a4d5650bb6d5a7a73980095a
SHA51224c2c7dc61ddd95c55b69a29b7cf3b8336d24eabc0cd89b4639d701851508265564d53b4fa4db2f48a1aa770919983820474e79f8f6d2868755996c30a35ada2