Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
17/01/2023, 22:04
Static task
static1
Behavioral task
behavioral1
Sample
d534da11-be41-4c1b-ab00-ddcf7bc442d0.js
Resource
win7-20221111-en
General
-
Target
d534da11-be41-4c1b-ab00-ddcf7bc442d0.js
-
Size
1.4MB
-
MD5
29bd036b564280a0e9b876ece0c39e95
-
SHA1
010441ddb171de2e865a185f45d9973f62c01294
-
SHA256
26c461c102538e0758dbc3f003850cf7c30760ff2d180dab4759f34e2cd951a1
-
SHA512
96c7624210db1403cded45418c671ab368f6c2aa90837551a9fd9f6de4110d319482c56f715e438d16f3e1ef305d71819363bd8ce9e2c034f7b032ab4c222c1d
-
SSDEEP
24576:VFDNjSzh3ZleO8du2Ih8XNn1ixHoZIK9zF2zbYeXGA93Uz:LDNjSN3b7b2Ih891ZT9JNAu
Malware Config
Signatures
-
Blocklisted process makes network request 14 IoCs
flow pid Process 26 1628 wscript.exe 35 1628 wscript.exe 45 1628 wscript.exe 46 1628 wscript.exe 49 1628 wscript.exe 52 1628 wscript.exe 53 1628 wscript.exe 54 1628 wscript.exe 55 1628 wscript.exe 56 1628 wscript.exe 57 1628 wscript.exe 58 1628 wscript.exe 59 1628 wscript.exe 60 1628 wscript.exe -
Executes dropped EXE 1 IoCs
pid Process 4808 Payload (3).exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PEDrooilsg.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PEDrooilsg.js wscript.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Payload (3).exe Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Payload (3).exe Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Payload (3).exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 27 ipinfo.io 28 ipinfo.io -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 Payload (3).exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Payload (3).exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4808 Payload (3).exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1612 wrote to memory of 1628 1612 wscript.exe 88 PID 1612 wrote to memory of 1628 1612 wscript.exe 88 PID 1612 wrote to memory of 4808 1612 wscript.exe 89 PID 1612 wrote to memory of 4808 1612 wscript.exe 89 PID 1612 wrote to memory of 4808 1612 wscript.exe 89 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Payload (3).exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Payload (3).exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\d534da11-be41-4c1b-ab00-ddcf7bc442d0.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\PEDrooilsg.js"2⤵
- Blocklisted process makes network request
- Drops startup file
PID:1628
-
-
C:\Users\Admin\AppData\Local\Temp\Payload (3).exe"C:\Users\Admin\AppData\Local\Temp\Payload (3).exe"2⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:4808
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
755KB
MD53e8af9fffb1b980b193508f6a8a8cdc3
SHA1e91e6f525952ae5a812d3cd3a795c6aeca94e527
SHA256ba055f5ffcf5c345e37307673717f11319326e5c4b621f336b76c4826b09f7cc
SHA512072bac20632cc30aa99715e4d5f508eab6a5b143704a0cdbbf0f5f22f86f4c02204efb1eb4acf8eeca97622c074bed2aa333119e842040e34ab55bff219a1f11
-
Filesize
755KB
MD53e8af9fffb1b980b193508f6a8a8cdc3
SHA1e91e6f525952ae5a812d3cd3a795c6aeca94e527
SHA256ba055f5ffcf5c345e37307673717f11319326e5c4b621f336b76c4826b09f7cc
SHA512072bac20632cc30aa99715e4d5f508eab6a5b143704a0cdbbf0f5f22f86f4c02204efb1eb4acf8eeca97622c074bed2aa333119e842040e34ab55bff219a1f11
-
Filesize
18KB
MD52ae3f4bf78428996391b735422d69932
SHA1c7cabe2cb2488d4dec8c31ec5d3694244f559149
SHA256c2f18d683b7e47c1758130920b336bdd440c3e879a2175b241b4b5d58e79604d
SHA5129f95c35cca567fb73fe4164402e5662fbe8839934491cc7e447338235ee4584f0c94ecb4dd1477cf2fe9f931b1a6ce0223f610cae54aab0d3aa789674bb880d8