Analysis

  • max time kernel
    147s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    13-01-2023 09:07

General

  • Target

    INVOICE 1284 - DO 1494 - PO073400-1.js

  • Size

    9KB

  • MD5

    34816f8d37a4fa88ebb8d8c45d9f5966

  • SHA1

    baab76a126651ea4c14432cf77f142e856accc5f

  • SHA256

    4fa2a72a2358d6c8d20940e46ef4d8e019110abe76d9af0371eb85b12eb908ef

  • SHA512

    9ab72f7ba776388327260627c43ce54ff420f760989ecd5e252d4780b02ba632367b3b9ac48d378660c1efc960166e2edc938046f57ae063641747767acbe6d8

  • SSDEEP

    192:t/Mhwhyw7h9s0jpb/a26Ky3hq/ry/+MZOMr8zJ9Bm/03H3LNSozkqjvbNHgS:tMyX7v/jVGLaMwzJDzLoozDjvbNAS

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 5 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1244
    • C:\Windows\system32\wscript.exe
      wscript.exe "C:\Users\Admin\AppData\Local\Temp\INVOICE 1284 - DO 1494 - PO073400-1.js"
      2⤵
      • Blocklisted process makes network request
      • Deletes itself
      • Loads dropped DLL
      • Modifies system certificate store
      • Suspicious use of WriteProcessMemory
      PID:900
      • C:\Users\Admin\AppData\Local\Temp\NHHiK.exe
        "C:\Users\Admin\AppData\Local\Temp\NHHiK.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1728
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
          4⤵
            PID:832
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
            4⤵
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of AdjustPrivilegeToken
            PID:1824
      • C:\Windows\SysWOW64\netsh.exe
        "C:\Windows\SysWOW64\netsh.exe"
        2⤵
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Modifies Internet Explorer settings
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:240
        • C:\Program Files\Mozilla Firefox\Firefox.exe
          "C:\Program Files\Mozilla Firefox\Firefox.exe"
          3⤵
            PID:560

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\NHHiK.exe

        Filesize

        319KB

        MD5

        c4be76b428d6f38b335c49e360e3e8d6

        SHA1

        b11aae54347f7d42a7168413b03e7d743b850daf

        SHA256

        8709e33a0e8a32066bed154147f47696c267a850c744c39167ec541b917403bd

        SHA512

        63ad32aa52e9e453da3030589d086a690dfceb21efc8c952d680dc9c783917581c02f778687dd78bebd54da38fe29f8c8df47f25a10031a41f9257002cdcaeda

      • C:\Users\Admin\AppData\Local\Temp\NHHiK.exe

        Filesize

        319KB

        MD5

        c4be76b428d6f38b335c49e360e3e8d6

        SHA1

        b11aae54347f7d42a7168413b03e7d743b850daf

        SHA256

        8709e33a0e8a32066bed154147f47696c267a850c744c39167ec541b917403bd

        SHA512

        63ad32aa52e9e453da3030589d086a690dfceb21efc8c952d680dc9c783917581c02f778687dd78bebd54da38fe29f8c8df47f25a10031a41f9257002cdcaeda

      • \Users\Admin\AppData\Local\Temp\NHHiK.exe

        Filesize

        319KB

        MD5

        c4be76b428d6f38b335c49e360e3e8d6

        SHA1

        b11aae54347f7d42a7168413b03e7d743b850daf

        SHA256

        8709e33a0e8a32066bed154147f47696c267a850c744c39167ec541b917403bd

        SHA512

        63ad32aa52e9e453da3030589d086a690dfceb21efc8c952d680dc9c783917581c02f778687dd78bebd54da38fe29f8c8df47f25a10031a41f9257002cdcaeda

      • \Users\Admin\AppData\Local\Temp\sqlite3.dll

        Filesize

        841KB

        MD5

        5fc6cd5d5ca1489d2a3c361717359a95

        SHA1

        5c630e232cd5761e7a611e41515be4afa3e7a141

        SHA256

        85c8b8a648c56cf5f063912e0e26ecebb90e0caf2f442fd5cdd8287301fe7e81

        SHA512

        5f9124a721f6b463d4f980920e87925098aa753b0fa2a59a3ff48b48d2b1a45d760fd46445414d84fb66321181cd2c82a4194361811114c15e35b42f838ab792

      • memory/240-74-0x0000000000C00000-0x0000000000F03000-memory.dmp

        Filesize

        3.0MB

      • memory/240-71-0x0000000000000000-mapping.dmp

      • memory/240-72-0x00000000015F0000-0x000000000160B000-memory.dmp

        Filesize

        108KB

      • memory/240-77-0x0000000075E11000-0x0000000075E13000-memory.dmp

        Filesize

        8KB

      • memory/240-73-0x00000000000C0000-0x00000000000ED000-memory.dmp

        Filesize

        180KB

      • memory/240-75-0x0000000000A40000-0x0000000000ACF000-memory.dmp

        Filesize

        572KB

      • memory/900-54-0x000007FEFBF81000-0x000007FEFBF83000-memory.dmp

        Filesize

        8KB

      • memory/1244-76-0x0000000006A00000-0x0000000006AD6000-memory.dmp

        Filesize

        856KB

      • memory/1244-70-0x0000000006E20000-0x0000000006F1D000-memory.dmp

        Filesize

        1012KB

      • memory/1244-79-0x0000000006A00000-0x0000000006AD6000-memory.dmp

        Filesize

        856KB

      • memory/1728-60-0x0000000000540000-0x000000000054A000-memory.dmp

        Filesize

        40KB

      • memory/1728-59-0x0000000000D20000-0x0000000000D76000-memory.dmp

        Filesize

        344KB

      • memory/1728-56-0x0000000000000000-mapping.dmp

      • memory/1824-69-0x00000000000F0000-0x0000000000100000-memory.dmp

        Filesize

        64KB

      • memory/1824-68-0x0000000000A70000-0x0000000000D73000-memory.dmp

        Filesize

        3.0MB

      • memory/1824-67-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/1824-66-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/1824-65-0x00000000004012E0-mapping.dmp

      • memory/1824-64-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/1824-62-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/1824-61-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB