Analysis
-
max time kernel
175s -
max time network
229s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
17/01/2023, 22:04
Static task
static1
Behavioral task
behavioral1
Sample
d534da11-be41-4c1b-ab00-ddcf7bc442d0.js
Resource
win7-20221111-en
General
-
Target
d534da11-be41-4c1b-ab00-ddcf7bc442d0.js
-
Size
1.4MB
-
MD5
29bd036b564280a0e9b876ece0c39e95
-
SHA1
010441ddb171de2e865a185f45d9973f62c01294
-
SHA256
26c461c102538e0758dbc3f003850cf7c30760ff2d180dab4759f34e2cd951a1
-
SHA512
96c7624210db1403cded45418c671ab368f6c2aa90837551a9fd9f6de4110d319482c56f715e438d16f3e1ef305d71819363bd8ce9e2c034f7b032ab4c222c1d
-
SSDEEP
24576:VFDNjSzh3ZleO8du2Ih8XNn1ixHoZIK9zF2zbYeXGA93Uz:LDNjSN3b7b2Ih891ZT9JNAu
Malware Config
Signatures
-
Blocklisted process makes network request 14 IoCs
flow pid Process 8 432 wscript.exe 15 432 wscript.exe 16 432 wscript.exe 18 432 wscript.exe 19 432 wscript.exe 20 432 wscript.exe 22 432 wscript.exe 23 432 wscript.exe 24 432 wscript.exe 26 432 wscript.exe 27 432 wscript.exe 28 432 wscript.exe 30 432 wscript.exe 31 432 wscript.exe -
Executes dropped EXE 1 IoCs
pid Process 1508 Payload (3).exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PEDrooilsg.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PEDrooilsg.js wscript.exe -
Loads dropped DLL 5 IoCs
pid Process 1992 WerFault.exe 1992 WerFault.exe 1992 WerFault.exe 1992 WerFault.exe 1992 WerFault.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Payload (3).exe Key opened \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Payload (3).exe Key opened \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Payload (3).exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 ipinfo.io 6 ipinfo.io -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1992 1508 WerFault.exe 30 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 Payload (3).exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Payload (3).exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1508 Payload (3).exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1224 wrote to memory of 432 1224 wscript.exe 28 PID 1224 wrote to memory of 432 1224 wscript.exe 28 PID 1224 wrote to memory of 432 1224 wscript.exe 28 PID 1224 wrote to memory of 1508 1224 wscript.exe 30 PID 1224 wrote to memory of 1508 1224 wscript.exe 30 PID 1224 wrote to memory of 1508 1224 wscript.exe 30 PID 1224 wrote to memory of 1508 1224 wscript.exe 30 PID 1508 wrote to memory of 1992 1508 Payload (3).exe 33 PID 1508 wrote to memory of 1992 1508 Payload (3).exe 33 PID 1508 wrote to memory of 1992 1508 Payload (3).exe 33 PID 1508 wrote to memory of 1992 1508 Payload (3).exe 33 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Payload (3).exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Payload (3).exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\d534da11-be41-4c1b-ab00-ddcf7bc442d0.js1⤵
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\PEDrooilsg.js"2⤵
- Blocklisted process makes network request
- Drops startup file
PID:432
-
-
C:\Users\Admin\AppData\Local\Temp\Payload (3).exe"C:\Users\Admin\AppData\Local\Temp\Payload (3).exe"2⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:1508 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1508 -s 18843⤵
- Loads dropped DLL
- Program crash
PID:1992
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
755KB
MD53e8af9fffb1b980b193508f6a8a8cdc3
SHA1e91e6f525952ae5a812d3cd3a795c6aeca94e527
SHA256ba055f5ffcf5c345e37307673717f11319326e5c4b621f336b76c4826b09f7cc
SHA512072bac20632cc30aa99715e4d5f508eab6a5b143704a0cdbbf0f5f22f86f4c02204efb1eb4acf8eeca97622c074bed2aa333119e842040e34ab55bff219a1f11
-
Filesize
755KB
MD53e8af9fffb1b980b193508f6a8a8cdc3
SHA1e91e6f525952ae5a812d3cd3a795c6aeca94e527
SHA256ba055f5ffcf5c345e37307673717f11319326e5c4b621f336b76c4826b09f7cc
SHA512072bac20632cc30aa99715e4d5f508eab6a5b143704a0cdbbf0f5f22f86f4c02204efb1eb4acf8eeca97622c074bed2aa333119e842040e34ab55bff219a1f11
-
Filesize
18KB
MD52ae3f4bf78428996391b735422d69932
SHA1c7cabe2cb2488d4dec8c31ec5d3694244f559149
SHA256c2f18d683b7e47c1758130920b336bdd440c3e879a2175b241b4b5d58e79604d
SHA5129f95c35cca567fb73fe4164402e5662fbe8839934491cc7e447338235ee4584f0c94ecb4dd1477cf2fe9f931b1a6ce0223f610cae54aab0d3aa789674bb880d8
-
Filesize
755KB
MD53e8af9fffb1b980b193508f6a8a8cdc3
SHA1e91e6f525952ae5a812d3cd3a795c6aeca94e527
SHA256ba055f5ffcf5c345e37307673717f11319326e5c4b621f336b76c4826b09f7cc
SHA512072bac20632cc30aa99715e4d5f508eab6a5b143704a0cdbbf0f5f22f86f4c02204efb1eb4acf8eeca97622c074bed2aa333119e842040e34ab55bff219a1f11
-
Filesize
755KB
MD53e8af9fffb1b980b193508f6a8a8cdc3
SHA1e91e6f525952ae5a812d3cd3a795c6aeca94e527
SHA256ba055f5ffcf5c345e37307673717f11319326e5c4b621f336b76c4826b09f7cc
SHA512072bac20632cc30aa99715e4d5f508eab6a5b143704a0cdbbf0f5f22f86f4c02204efb1eb4acf8eeca97622c074bed2aa333119e842040e34ab55bff219a1f11
-
Filesize
755KB
MD53e8af9fffb1b980b193508f6a8a8cdc3
SHA1e91e6f525952ae5a812d3cd3a795c6aeca94e527
SHA256ba055f5ffcf5c345e37307673717f11319326e5c4b621f336b76c4826b09f7cc
SHA512072bac20632cc30aa99715e4d5f508eab6a5b143704a0cdbbf0f5f22f86f4c02204efb1eb4acf8eeca97622c074bed2aa333119e842040e34ab55bff219a1f11
-
Filesize
755KB
MD53e8af9fffb1b980b193508f6a8a8cdc3
SHA1e91e6f525952ae5a812d3cd3a795c6aeca94e527
SHA256ba055f5ffcf5c345e37307673717f11319326e5c4b621f336b76c4826b09f7cc
SHA512072bac20632cc30aa99715e4d5f508eab6a5b143704a0cdbbf0f5f22f86f4c02204efb1eb4acf8eeca97622c074bed2aa333119e842040e34ab55bff219a1f11
-
Filesize
755KB
MD53e8af9fffb1b980b193508f6a8a8cdc3
SHA1e91e6f525952ae5a812d3cd3a795c6aeca94e527
SHA256ba055f5ffcf5c345e37307673717f11319326e5c4b621f336b76c4826b09f7cc
SHA512072bac20632cc30aa99715e4d5f508eab6a5b143704a0cdbbf0f5f22f86f4c02204efb1eb4acf8eeca97622c074bed2aa333119e842040e34ab55bff219a1f11