Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
25-01-2023 10:01
Static task
static1
Behavioral task
behavioral1
Sample
Attachment.js
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Attachment.js
Resource
win10v2004-20220812-en
General
-
Target
Attachment.js
-
Size
9KB
-
MD5
0d7aac781fcb032d7e6261638b17318a
-
SHA1
cec8bda522ab70b14410759ffa12e69e00a892c3
-
SHA256
0250ebf092c4efff85ec3996a9011d37d091de867cce42d174c5c2a6c61a4d12
-
SHA512
a3813a1a337c4f8390c0b3cdb9134830ce444975322099115e8cfe4e7c6b567488d39e31922ffe02417c0263fd51c38953c84fa5be4f5a83da833bb060b5fbcf
-
SSDEEP
192:JDohqMizzyhd9jRpUT7BUPsqzr/8qzrYihEvWXJtjB034BeRISx5RxV1ctOsqBt+:Jsliyhr1/aeX/jB034BeR7cIsWtY0lRI
Malware Config
Signatures
-
Blocklisted process makes network request 6 IoCs
Processes:
wscript.execmd.exeflow pid process 4 1112 wscript.exe 6 1112 wscript.exe 8 1112 wscript.exe 10 1112 wscript.exe 12 1112 wscript.exe 17 672 cmd.exe -
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
Processes:
HHG.exepid process 1168 HHG.exe -
Deletes itself 1 IoCs
Processes:
wscript.exepid process 1112 wscript.exe -
Loads dropped DLL 1 IoCs
Processes:
cmd.exepid process 672 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 3 IoCs
Processes:
HHG.exeCaspol.execmd.exedescription pid process target process PID 1168 set thread context of 1840 1168 HHG.exe Caspol.exe PID 1840 set thread context of 1256 1840 Caspol.exe Explorer.EXE PID 672 set thread context of 1256 672 cmd.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
cmd.exedescription ioc process Key created \Registry\User\S-1-5-21-2292972927-2705560509-2768824231-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 cmd.exe -
Processes:
wscript.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 wscript.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 wscript.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 0f00000001000000140000005bcaa1c2780f0bcb5a90770451d96f38963f012d0b000000010000001e000000440053005400200052006f006f0074002000430041002000580033000000090000000100000016000000301406082b0601050507030406082b06010505070301140000000100000014000000c4a7b1a47b2c71fadbe14b9075ffc415608589101d00000001000000100000004558d512eecb27464920897de7b66053030000000100000014000000dac9024f54d8f6df94935fb1732638ca6ad77c1320000000010000004e0300003082034a30820232a003020102021044afb080d6a327ba893039862ef8406b300d06092a864886f70d0101050500303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f74204341205833301e170d3030303933303231313231395a170d3231303933303134303131355a303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f7420434120583330820122300d06092a864886f70d01010105000382010f003082010a0282010100dfafe99750088357b4cc6265f69082ecc7d32c6b30ca5becd9c37dc740c118148be0e83376492ae33f214993ac4e0eaf3e48cb65eefcd3210f65d22ad9328f8ce5f777b0127bb595c089a3a9baed732e7a0c063283a27e8a1430cd11a0e12a38b9790a31fd50bd8065dfb7516383c8e28861ea4b6181ec526bb9a2e24b1a289f48a39e0cda098e3e172e1edd20df5bc62a8aab2ebd70adc50b1a25907472c57b6aab34d63089ffe568137b540bc8d6aeec5a9c921e3d64b38cc6dfbfc94170ec1672d526ec38553943d0fcfd185c40f197ebd59a9b8d1dbada25b9c6d8dfc115023aabda6ef13e2ef55c089c3cd68369e4109b192ab62957e3e53d9b9ff0025d0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020106301d0603551d0e04160414c4a7b1a47b2c71fadbe14b9075ffc41560858910300d06092a864886f70d01010505000382010100a31a2c9b17005ca91eee2866373abf83c73f4bc309a095205de3d95944d23e0d3ebd8a4ba0741fce10829c741a1d7e981addcb134bb32044e491e9ccfc7da5db6ae5fee6fde04eddb7003ab57049aff2e5eb02f1d1028b19cb943a5e48c4181e58195f1e025af00cf1b1ada9dc59868b6ee991f586cafab96633aa595bcee2a7167347cb2bcc99b03748cfe3564bf5cf0f0c723287c6f044bb53726d43f526489a5267b758abfe67767178db0da256141339243185a2a8025a3047e1dd5007bc02099000eb6463609b16bc88c912e6d27d918bf93d328d65b4e97cb15776eac5b62839bf15651cc8f677966a0a8d770bd8910b048e07db29b60aee9d82353510 wscript.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 wscript.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 wscript.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
Processes:
HHG.exeCaspol.execmd.exepid process 1168 HHG.exe 1168 HHG.exe 1840 Caspol.exe 1840 Caspol.exe 1840 Caspol.exe 1840 Caspol.exe 672 cmd.exe 672 cmd.exe 672 cmd.exe 672 cmd.exe 672 cmd.exe 672 cmd.exe 672 cmd.exe 672 cmd.exe 672 cmd.exe 672 cmd.exe 672 cmd.exe 672 cmd.exe 672 cmd.exe 672 cmd.exe 672 cmd.exe 672 cmd.exe 672 cmd.exe 672 cmd.exe 672 cmd.exe 672 cmd.exe 672 cmd.exe 672 cmd.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
Processes:
Caspol.execmd.exepid process 1840 Caspol.exe 1840 Caspol.exe 1840 Caspol.exe 672 cmd.exe 672 cmd.exe 672 cmd.exe 672 cmd.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
HHG.exeCaspol.execmd.exedescription pid process Token: SeDebugPrivilege 1168 HHG.exe Token: SeDebugPrivilege 1840 Caspol.exe Token: SeDebugPrivilege 672 cmd.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
wscript.exeHHG.exeExplorer.EXEcmd.exedescription pid process target process PID 1112 wrote to memory of 1168 1112 wscript.exe HHG.exe PID 1112 wrote to memory of 1168 1112 wscript.exe HHG.exe PID 1112 wrote to memory of 1168 1112 wscript.exe HHG.exe PID 1112 wrote to memory of 1168 1112 wscript.exe HHG.exe PID 1168 wrote to memory of 1532 1168 HHG.exe Caspol.exe PID 1168 wrote to memory of 1532 1168 HHG.exe Caspol.exe PID 1168 wrote to memory of 1532 1168 HHG.exe Caspol.exe PID 1168 wrote to memory of 1532 1168 HHG.exe Caspol.exe PID 1168 wrote to memory of 1840 1168 HHG.exe Caspol.exe PID 1168 wrote to memory of 1840 1168 HHG.exe Caspol.exe PID 1168 wrote to memory of 1840 1168 HHG.exe Caspol.exe PID 1168 wrote to memory of 1840 1168 HHG.exe Caspol.exe PID 1168 wrote to memory of 1840 1168 HHG.exe Caspol.exe PID 1168 wrote to memory of 1840 1168 HHG.exe Caspol.exe PID 1168 wrote to memory of 1840 1168 HHG.exe Caspol.exe PID 1256 wrote to memory of 672 1256 Explorer.EXE cmd.exe PID 1256 wrote to memory of 672 1256 Explorer.EXE cmd.exe PID 1256 wrote to memory of 672 1256 Explorer.EXE cmd.exe PID 1256 wrote to memory of 672 1256 Explorer.EXE cmd.exe PID 672 wrote to memory of 1896 672 cmd.exe Firefox.exe PID 672 wrote to memory of 1896 672 cmd.exe Firefox.exe PID 672 wrote to memory of 1896 672 cmd.exe Firefox.exe PID 672 wrote to memory of 1896 672 cmd.exe Firefox.exe PID 672 wrote to memory of 1896 672 cmd.exe Firefox.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\Attachment.js2⤵
- Blocklisted process makes network request
- Deletes itself
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\HHG.exe"C:\Users\Admin\AppData\Local\Temp\HHG.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Caspol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Caspol.exe"4⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Caspol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Caspol.exe"4⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"2⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\HHG.exeFilesize
282KB
MD558b8732ed17532b518bd90b68b934b23
SHA1dbb672289a9ebde17cb77424615a1c186995d1f3
SHA256f6eb53bca5075725d889aa5de1f4541cd764bed2bd46aeefcfa4a1b018b6a4fb
SHA512824e7e7cdccb4d60f72ad70fd73ea8184b1ed7b1d7b2e9a9426ec58380f3f4f769bee8b55d5d8c2450a6bfe37a2f737cc6a88c77e6bf1dde1984edc8c4e3b75c
-
C:\Users\Admin\AppData\Local\Temp\HHG.exeFilesize
282KB
MD558b8732ed17532b518bd90b68b934b23
SHA1dbb672289a9ebde17cb77424615a1c186995d1f3
SHA256f6eb53bca5075725d889aa5de1f4541cd764bed2bd46aeefcfa4a1b018b6a4fb
SHA512824e7e7cdccb4d60f72ad70fd73ea8184b1ed7b1d7b2e9a9426ec58380f3f4f769bee8b55d5d8c2450a6bfe37a2f737cc6a88c77e6bf1dde1984edc8c4e3b75c
-
\Users\Admin\AppData\Local\Temp\sqlite3.dllFilesize
770KB
MD565f6090dfb069aca962a59f6df9e6113
SHA1879bad504dfcce1a591c97817f3ff1e63931cfd2
SHA25632a302d8c235226d8cdda4d957f151df3e5736fdce7886e6c794f0648b2eb106
SHA5124c0e5e1103749356dceaaaa312e853bda83ec14f2f12288e9020cdf42b6e80d4caaec03d1ef7f34d81ddf2da88e6160c0c711380c2a7d89012e660406cdbb987
-
memory/672-72-0x0000000000000000-mapping.dmp
-
memory/672-78-0x0000000075F51000-0x0000000075F53000-memory.dmpFilesize
8KB
-
memory/672-76-0x00000000022C0000-0x000000000234F000-memory.dmpFilesize
572KB
-
memory/672-75-0x0000000001FB0000-0x00000000022B3000-memory.dmpFilesize
3.0MB
-
memory/672-73-0x0000000049EA0000-0x0000000049EEC000-memory.dmpFilesize
304KB
-
memory/672-74-0x0000000000080000-0x00000000000AD000-memory.dmpFilesize
180KB
-
memory/1112-54-0x000007FEFB871000-0x000007FEFB873000-memory.dmpFilesize
8KB
-
memory/1168-60-0x00000000003D0000-0x00000000003DC000-memory.dmpFilesize
48KB
-
memory/1168-61-0x00000000003E0000-0x00000000003E8000-memory.dmpFilesize
32KB
-
memory/1168-55-0x0000000000000000-mapping.dmp
-
memory/1168-58-0x00000000013D0000-0x000000000141C000-memory.dmpFilesize
304KB
-
memory/1168-59-0x0000000000960000-0x00000000009AA000-memory.dmpFilesize
296KB
-
memory/1256-80-0x0000000006640000-0x0000000006747000-memory.dmpFilesize
1.0MB
-
memory/1256-77-0x0000000006640000-0x0000000006747000-memory.dmpFilesize
1.0MB
-
memory/1256-71-0x0000000004CC0000-0x0000000004DE1000-memory.dmpFilesize
1.1MB
-
memory/1840-69-0x0000000000990000-0x0000000000C93000-memory.dmpFilesize
3.0MB
-
memory/1840-62-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1840-63-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1840-65-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1840-70-0x0000000000120000-0x0000000000130000-memory.dmpFilesize
64KB
-
memory/1840-66-0x00000000004012E0-mapping.dmp
-
memory/1840-68-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1840-67-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB