Analysis
-
max time kernel
141s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
26-03-2023 09:44
Behavioral task
behavioral1
Sample
2ecb8a22e5831fafcbaf0392b5b617c3.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2ecb8a22e5831fafcbaf0392b5b617c3.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
c72d738747f68d4f8d9e9368e47928bf.js
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
c72d738747f68d4f8d9e9368e47928bf.js
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
ec5e12b3ea2318692c2d2b74c33dfbda.jar
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
ec5e12b3ea2318692c2d2b74c33dfbda.jar
Resource
win10v2004-20230220-en
General
-
Target
c72d738747f68d4f8d9e9368e47928bf.js
-
Size
9.2MB
-
MD5
c72d738747f68d4f8d9e9368e47928bf
-
SHA1
00b523b2e3ab0f2bfd7d4aabf3b1c33ae390c585
-
SHA256
06b94b3ec86bd4a61888848f379808954de1ff2a1fe471edcfa312f5e9ba2ab5
-
SHA512
1a01baa0c813b928cf5dfe456f76acdcf9be0e0df8a6131e248f9aa5456c65a69cb9809efe56afc4db32cfeeb93ca42e3319f1e53689ba4ed23b77911b802c61
-
SSDEEP
3072:gNK8RjR/R8x/xqm2O1IrWa7Mjv/GnOv3GmPLjCKKIz9vs2J96i/OBDVOdz83Pm7+:I
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 9 2800 WScript.exe 47 2800 WScript.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\oUvEoxxwKv.js WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\oUvEoxxwKv.js WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings wscript.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4980 wrote to memory of 2800 4980 wscript.exe 84 PID 4980 wrote to memory of 2800 4980 wscript.exe 84 PID 4980 wrote to memory of 4376 4980 wscript.exe 85 PID 4980 wrote to memory of 4376 4980 wscript.exe 85
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\c72d738747f68d4f8d9e9368e47928bf.js1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\oUvEoxxwKv.js"2⤵
- Blocklisted process makes network request
- Drops startup file
PID:2800
-
-
C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe"C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\rodmr.txt"2⤵PID:4376
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5b7e9c8bac9afc434944605c2422e1ad0
SHA1a653b478be92ecbd848bf79e175c454ebb9ccf21
SHA256be481241ae35aed859e1b558e23fcf640e0ec5f36d1e993a085ccc499b62c465
SHA512b790f27cce05ee3c754728489c8912501dc5c61d00639db760957697e3ea28855a81ce38634ddf2d98bf865055977c4d5dd2faaecc3a625eb090012161df2190
-
Filesize
164KB
MD5ec5e12b3ea2318692c2d2b74c33dfbda
SHA1f7f6c3d3e266c7a85ec489389d5508eaa1983055
SHA256056579d3948044c01ffa21dd8a14f7c4109efd25e609055e24a37cb6db603ef7
SHA5120c91246971bb23ba3801b348ca8148c048de43c4caa7912b681868e471f5a0f080f2969e8fda1b04a002a81b403bddb22b62496b8eee75814cb691391ad5851a