Analysis
-
max time kernel
135s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
15-06-2023 23:47
Static task
static1
Behavioral task
behavioral1
Sample
Inv_Scan_06_15(72).js
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Inv_Scan_06_15(72).js
Resource
win10v2004-20230220-en
General
-
Target
Inv_Scan_06_15(72).js
-
Size
797KB
-
MD5
5f67a2c149401addd1224a4f1c191d07
-
SHA1
d0a229b6d14fd3c32c8f696b97717b86644c1b6b
-
SHA256
92506fe773db7472e7782dbb5403548323e65a9eb2e4c15f9ac65ee6c4bd908b
-
SHA512
7a68e3057abdbe9892b6217ed1ed9a39fd63811446e16ab5e3056ac6c0ce08a15b9052c1288dc6f0af72939112fdf02cf2999749d665a91ec4ecf1aeae8ac21f
-
SSDEEP
24576:Gpt/GAh0WbGhCxS2f1Tyj53rpeMnaEEfutJAFMMGDhRvu4nMJUTe1ka6MdF2lXSh:Aw7WbGhCxS2f1Tyj53rpeMnaE6utJAFF
Malware Config
Signatures
-
Blocklisted process makes network request 4 IoCs
flow pid Process 12 1872 wscript.exe 14 1872 wscript.exe 23 1872 wscript.exe 25 1872 wscript.exe -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation wscript.exe -
Loads dropped DLL 2 IoCs
pid Process 3392 rundll32.exe 4904 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3392 rundll32.exe 3392 rundll32.exe 4904 rundll32.exe 4904 rundll32.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1872 wrote to memory of 3392 1872 wscript.exe 83 PID 1872 wrote to memory of 3392 1872 wscript.exe 83 PID 1872 wrote to memory of 4904 1872 wscript.exe 84 PID 1872 wrote to memory of 4904 1872 wscript.exe 84
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\Inv_Scan_06_15(72).js1⤵
- Blocklisted process makes network request
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\145665.dat,vcab /k snickers3282⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:3392
-
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\983813.dat,vcab /k snickers3282⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:4904
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
314KB
MD59b71e0314206a22824afff1c4ccf42fd
SHA1e7188f764c5e0f6986375332382a707fdb426247
SHA25622913d02c0c67bc3f3185b8424680216df36ecd76fd16c242cc55ee80cd8d90b
SHA5121795f3a5a37bae9a87d072fa1613ed90edf54a80c02c176e1c52f06e0dd9625943853cd1c2e7b219cfb60e37c89cbe38671a147b6876c4b6ed1f8574f6fc8f83
-
Filesize
314KB
MD59b71e0314206a22824afff1c4ccf42fd
SHA1e7188f764c5e0f6986375332382a707fdb426247
SHA25622913d02c0c67bc3f3185b8424680216df36ecd76fd16c242cc55ee80cd8d90b
SHA5121795f3a5a37bae9a87d072fa1613ed90edf54a80c02c176e1c52f06e0dd9625943853cd1c2e7b219cfb60e37c89cbe38671a147b6876c4b6ed1f8574f6fc8f83
-
Filesize
314KB
MD5951270cf894d77cd3673b3a57b045c92
SHA1889ad6be587ed3ad7df97599a170f59f095a1e98
SHA256647c82b4abec0bf581e391d1c6f59ececd224079414b8366b6e6a7bff682d4b0
SHA512adf27637d4ef4883a1e5627f9ef6af04e56c6f74404bbea8be07b8e0b16290ac9b45ab117dc2f848b62888c7eb73e4d985e31aaa2d921c582ba7630afd4738a7
-
Filesize
314KB
MD5951270cf894d77cd3673b3a57b045c92
SHA1889ad6be587ed3ad7df97599a170f59f095a1e98
SHA256647c82b4abec0bf581e391d1c6f59ececd224079414b8366b6e6a7bff682d4b0
SHA512adf27637d4ef4883a1e5627f9ef6af04e56c6f74404bbea8be07b8e0b16290ac9b45ab117dc2f848b62888c7eb73e4d985e31aaa2d921c582ba7630afd4738a7