Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
12/01/2023, 04:30
Static task
static1
Behavioral task
behavioral1
Sample
0de7b7c82d71f980e5261c40188bafc6d95c484a2bf7007828e93f16d9ae1d9a.jar
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
0de7b7c82d71f980e5261c40188bafc6d95c484a2bf7007828e93f16d9ae1d9a.jar
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
2b0c9059feece8475c71fbbde6cf4963132c274cf7ddebafbf2b0a59523c532e.js
Resource
win7-20220812-en
General
-
Target
2b0c9059feece8475c71fbbde6cf4963132c274cf7ddebafbf2b0a59523c532e.js
-
Size
271KB
-
MD5
56874c0b5d9fe1a62597098be19113cb
-
SHA1
235b0c6b6ff8c2c667a3aca376e6d09bee039eee
-
SHA256
2b0c9059feece8475c71fbbde6cf4963132c274cf7ddebafbf2b0a59523c532e
-
SHA512
a1039448cf03ca10ef9d05cb3ebf418c45e2083964c9a66f7009beb7b36db41a979618813d0abf6cd03dc38c7709bf1aebe9cd11067afad2358a2145da109f2e
-
SSDEEP
6144:jCPjENIBMqnbvmNETFwauvrb7gOhpFtwWIVyWT:jCPjENI6Cm6zSP9pFKWK
Malware Config
Signatures
-
Blocklisted process makes network request 15 IoCs
flow pid Process 7 5068 WScript.exe 26 5068 WScript.exe 30 5068 WScript.exe 38 5068 WScript.exe 56 5068 WScript.exe 113 5068 WScript.exe 148 5068 WScript.exe 178 5068 WScript.exe 207 5068 WScript.exe 214 5068 WScript.exe 215 5068 WScript.exe 234 5068 WScript.exe 235 5068 WScript.exe 236 5068 WScript.exe 237 5068 WScript.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\KeunXSGcHu.js WScript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\KeunXSGcHu.js WScript.exe -
Drops file in Program Files directory 12 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\server\symbols\dll\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\server\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\server\symbols\dll\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\dll\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\symbols\dll\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\server\dll\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\dll\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\symbols\dll\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\server\dll\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\server\jvm.pdb javaw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings wscript.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3208 wrote to memory of 5068 3208 wscript.exe 82 PID 3208 wrote to memory of 5068 3208 wscript.exe 82 PID 3208 wrote to memory of 4032 3208 wscript.exe 83 PID 3208 wrote to memory of 4032 3208 wscript.exe 83
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\2b0c9059feece8475c71fbbde6cf4963132c274cf7ddebafbf2b0a59523c532e.js1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\KeunXSGcHu.js"2⤵
- Blocklisted process makes network request
- Drops startup file
PID:5068
-
-
C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe"C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\dmesgsmu.txt"2⤵
- Drops file in Program Files directory
PID:4032
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD5ec2f8b54b8cfbd39beb6b801a557bf47
SHA1707d30d858c61d664e5808c1ccc5d7e335d3f6fe
SHA256d22af6595a12474313f3e4c10300603e57c1cd04d9ebdffee52032a3411d2948
SHA51249459bc20244d28a2882c6f98de3835bbb25efdaac42888cac0f01dfeca2e2909e447294d9559f9b6c9fa1e4583969d61facd79c0761fd52195f2dc4d3b47bda
-
Filesize
91KB
MD519d1b98ca53a49b901f056c6da2478d2
SHA1c94af0fd581ed91814de3f01be03e42e143493dd
SHA2560de7b7c82d71f980e5261c40188bafc6d95c484a2bf7007828e93f16d9ae1d9a
SHA512ae74c208cf339c2831d9b5574826538f9c48766d7a94ec3632569d06ec0306e271eab539bde4cbeeff632f5c2d043b7b64cb25cf575b67b4fddff60e3adaf198