Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
16/01/2023, 00:49
Static task
static1
Behavioral task
behavioral1
Sample
3302df5f8ce7bf4195423d817b76fbf3a82478a0.js
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
3302df5f8ce7bf4195423d817b76fbf3a82478a0.js
Resource
win10v2004-20220812-en
General
-
Target
3302df5f8ce7bf4195423d817b76fbf3a82478a0.js
-
Size
98KB
-
MD5
c090ca2f9808bc37a0fa5ffe6e2d538e
-
SHA1
3302df5f8ce7bf4195423d817b76fbf3a82478a0
-
SHA256
c606703754ef90e65b2a223be654af920b3da321dfca28bcf0679e445a44a0f3
-
SHA512
e17a4f9ef86928738bf916d5f0590fdc59742ab72328bb8446743eb71f21d80a4e7333fdcbc288676cb16140b30f65eb19fdf5b2cea8298eaa96818a9b203b45
-
SSDEEP
1536:n4Y+xv0wkOp2tBtCsbAmpp6rUS+zoBkBuTXkd8CnNaBOl9PbF9m/JCwBA6aUX:K0wkI2vbAmL5EBkBmXkBEOPtwBaUX
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation wscript.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3888 pOwErsHelL.exe 3888 pOwErsHelL.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3888 pOwErsHelL.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2888 wrote to memory of 1540 2888 wscript.EXE 88 PID 2888 wrote to memory of 1540 2888 wscript.EXE 88 PID 1540 wrote to memory of 3888 1540 cscript.exe 90 PID 1540 wrote to memory of 3888 1540 cscript.exe 90
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\3302df5f8ce7bf4195423d817b76fbf3a82478a0.js1⤵PID:3444
-
C:\Windows\system32\wscript.EXEC:\Windows\system32\wscript.EXE ARCHIT~1.JS1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\System32\cscript.exe"C:\Windows\System32\cscript.exe" "ARCHIT~1.JS"2⤵
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Windows\System32\WindowsPowerShell\v1.0\pOwErsHelL.exepOwErsHelL3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3888
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46.0MB
MD5100658beccb7962cb385f4ed118e2e62
SHA1cbe9ffc1ecf0b0498458d5b68ac4fac92c9540c0
SHA25615a39e3848c6009ecbc52dd455c36b2581f652f95e863bdb2d75062906e226f0
SHA512524566e915a460396dad37935cf4bec6c043d4890109673c7ca3d2bd8f60698da38c945d36b53bc0040bea25fd079a057cad4fe422a457022cc5d39bd1363cb2