Resubmissions

08-10-2023 11:53

231008-n2cflsbg3s 1

07-10-2023 17:03

231007-vk4xvsdh4s 1

Analysis

  • max time kernel
    159s
  • max time network
    166s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-10-2023 11:53

General

  • Target

    NEAS_JC.js

  • Size

    30KB

  • MD5

    4a21eaccfbfa2f7ea311db7f63818961

  • SHA1

    63d466fc3413e6ae80f039b8815fd75dcb770dd4

  • SHA256

    d919028ded9a2838dc922166bc6c4df025ec1656011a0637268241017eb4b88b

  • SHA512

    89a70baf629d99b9616ee771986114e70382302b9c6c4444612668b01056c9dc8ea4a96536e78da4097818a7cb987e48157d3c4b6d04eb91fb645ba61dcc2714

  • SSDEEP

    384:rxzBB2qHEx4iWBi5edDEcaKvtOXmPqwtOrPqwtO/diD+BuvYOPFz4/oWwzK8tQiP:r12qHq4iWB/mQ8cikcYo9

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 5 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 4 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 35 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\NEAS_JC.js
    1⤵
      PID:4324
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:3836
      • C:\Windows\System32\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\NEAS_JC.js"
        1⤵
          PID:1332
        • C:\Windows\System32\svchost.exe
          C:\Windows\System32\svchost.exe -k UnistackSvcGroup
          1⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:4324
        • C:\Windows\System32\SystemSettingsBroker.exe
          C:\Windows\System32\SystemSettingsBroker.exe -Embedding
          1⤵
            PID:4668
          • C:\Windows\system32\OpenWith.exe
            C:\Windows\system32\OpenWith.exe -Embedding
            1⤵
            • Modifies registry class
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:3820
            • C:\Windows\System32\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\NEAS_JC.js"
              2⤵
                PID:2284
            • C:\Windows\system32\OpenWith.exe
              C:\Windows\system32\OpenWith.exe -Embedding
              1⤵
              • Modifies registry class
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:3848
              • C:\Windows\system32\NOTEPAD.EXE
                "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\NEAS_JC.js
                2⤵
                • Opens file in notepad (likely ransom note)
                PID:3352
            • C:\Windows\system32\rundll32.exe
              "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
              1⤵
                PID:2164
              • C:\Windows\system32\OpenWith.exe
                C:\Windows\system32\OpenWith.exe -Embedding
                1⤵
                • Suspicious use of SetWindowsHookEx
                PID:3248
              • C:\Windows\system32\OpenWith.exe
                C:\Windows\system32\OpenWith.exe -Embedding
                1⤵
                • Modifies registry class
                • Suspicious behavior: GetForegroundWindowSpam
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:1388
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url "C:\Users\Admin\AppData\Local\Temp\NEAS_JC.js"
                  2⤵
                  • Suspicious use of WriteProcessMemory
                  PID:4904
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url C:\Users\Admin\AppData\Local\Temp\NEAS_JC.js
                    3⤵
                    • Checks processor information in registry
                    • Modifies registry class
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of FindShellTrayWindow
                    • Suspicious use of SendNotifyMessage
                    • Suspicious use of SetWindowsHookEx
                    • Suspicious use of WriteProcessMemory
                    PID:4084
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4084.0.1581171130\35741779" -parentBuildID 20221007134813 -prefsHandle 1856 -prefMapHandle 1848 -prefsLen 20938 -prefMapSize 232675 -appDir "C:\Program Files\Mozilla Firefox\browser" - {3509473e-5486-4e85-b8b0-502b4ef391c8} 4084 "\\.\pipe\gecko-crash-server-pipe.4084" 1956 2e38c9dae58 gpu
                      4⤵
                        PID:1792
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4084.1.1646219913\209886542" -parentBuildID 20221007134813 -prefsHandle 2376 -prefMapHandle 2372 -prefsLen 21754 -prefMapSize 232675 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cece7de1-a50d-4f7b-8ec7-29d864aa8aab} 4084 "\\.\pipe\gecko-crash-server-pipe.4084" 2388 2e38c90a258 socket
                        4⤵
                          PID:4144
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4084.2.451976246\1002692764" -childID 1 -isForBrowser -prefsHandle 3104 -prefMapHandle 3100 -prefsLen 21857 -prefMapSize 232675 -jsInitHandle 1408 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {eab0072c-cbd4-4877-83bc-76fe03356719} 4084 "\\.\pipe\gecko-crash-server-pipe.4084" 2960 2e38c95e258 tab
                          4⤵
                            PID:5216
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4084.3.260969309\663853815" -childID 2 -isForBrowser -prefsHandle 3560 -prefMapHandle 3556 -prefsLen 26437 -prefMapSize 232675 -jsInitHandle 1408 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {be56a3ff-baa3-43bd-9242-d0003fd88248} 4084 "\\.\pipe\gecko-crash-server-pipe.4084" 3572 2e38eac0e58 tab
                            4⤵
                              PID:5368
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4084.6.695803794\761338524" -childID 5 -isForBrowser -prefsHandle 5416 -prefMapHandle 5420 -prefsLen 26752 -prefMapSize 232675 -jsInitHandle 1408 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {89f5f680-8492-4e89-a008-035146c12c36} 4084 "\\.\pipe\gecko-crash-server-pipe.4084" 5404 2e392bbea58 tab
                              4⤵
                                PID:6084
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4084.5.706499997\958447318" -childID 4 -isForBrowser -prefsHandle 5220 -prefMapHandle 5224 -prefsLen 26752 -prefMapSize 232675 -jsInitHandle 1408 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {57caa9b0-c51f-45bb-96d8-5be206c32348} 4084 "\\.\pipe\gecko-crash-server-pipe.4084" 5212 2e392b05958 tab
                                4⤵
                                  PID:6076
                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4084.4.981614614\864407986" -childID 3 -isForBrowser -prefsHandle 5092 -prefMapHandle 5072 -prefsLen 26752 -prefMapSize 232675 -jsInitHandle 1408 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1ee3dc95-099c-4ea8-a343-814226d42bb2} 4084 "\\.\pipe\gecko-crash-server-pipe.4084" 5088 2e3928dff58 tab
                                  4⤵
                                    PID:6068

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\b7jtu2fw.default-release\activity-stream.discovery_stream.json.tmp

                              Filesize

                              22KB

                              MD5

                              1a686d41d817cc66dc28726083345701

                              SHA1

                              7f663bedf0cfad317edf5076503df0c106dc7db9

                              SHA256

                              963feca92812b50ecb8e283e921594d4f1919b82066e0fd0416d39888d3aaaae

                              SHA512

                              e915ba8761f9fa33e0351fdf2fa93a7f3d1cc74cb01ef14eb7f28400644ca411389a1e32e0a3b99c6836634ed5002a407f1596920216db1e0d453bf33d675c78

                            • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\b7jtu2fw.default-release\cache2\entries\180089313729568CF6D0CAF9991F0FA4115478F0

                              Filesize

                              13KB

                              MD5

                              e9aa439585c546d01373cbb375beb28c

                              SHA1

                              3b7a4950396b31dc942dcc0f5d6afcbb78b3dd6c

                              SHA256

                              b8aa7390fe8a591b25c5d667f26debad72db811fb2d7768d2c9ff7e5de662ed1

                              SHA512

                              25f2cc100f37e0dd349559b0de8db38757d925d8ec9507a9595480cf80d9f79f8c980bbf2e2933daaa09013ef58274f08c679f66d184c7c00eee29b29d236de0

                            • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\b7jtu2fw.default-release\cache2\entries\C04F9E5FB4A1D1550B6691F4F82AA8F27ADD547C

                              Filesize

                              8.1MB

                              MD5

                              e04e0b249a14f390be6ef1ad12d16504

                              SHA1

                              ebe2e7847bd2ad050f91e0dfc6aaf7e513302bd4

                              SHA256

                              17fac8584927e9be533942114563b5cd7f9608ac02501f1e89eebd0f5da766d6

                              SHA512

                              d27c49a60b96375981224526d17f7ce1a0b63ba5a3651a54616bedd0a33544157cf9ff19811dd145610d215218320efabac99ebf5138c2e1c18f5ecf5f5873c7

                            • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                              Filesize

                              442KB

                              MD5

                              85430baed3398695717b0263807cf97c

                              SHA1

                              fffbee923cea216f50fce5d54219a188a5100f41

                              SHA256

                              a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e

                              SHA512

                              06511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\b7jtu2fw.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll

                              Filesize

                              997KB

                              MD5

                              fe3355639648c417e8307c6d051e3e37

                              SHA1

                              f54602d4b4778da21bc97c7238fc66aa68c8ee34

                              SHA256

                              1ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e

                              SHA512

                              8f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\b7jtu2fw.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info

                              Filesize

                              116B

                              MD5

                              3d33cdc0b3d281e67dd52e14435dd04f

                              SHA1

                              4db88689282fd4f9e9e6ab95fcbb23df6e6485db

                              SHA256

                              f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b

                              SHA512

                              a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\b7jtu2fw.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt

                              Filesize

                              479B

                              MD5

                              49ddb419d96dceb9069018535fb2e2fc

                              SHA1

                              62aa6fea895a8b68d468a015f6e6ab400d7a7ca6

                              SHA256

                              2af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539

                              SHA512

                              48386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\b7jtu2fw.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json

                              Filesize

                              372B

                              MD5

                              8be33af717bb1b67fbd61c3f4b807e9e

                              SHA1

                              7cf17656d174d951957ff36810e874a134dd49e0

                              SHA256

                              e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd

                              SHA512

                              6125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\b7jtu2fw.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll

                              Filesize

                              11.8MB

                              MD5

                              33bf7b0439480effb9fb212efce87b13

                              SHA1

                              cee50f2745edc6dc291887b6075ca64d716f495a

                              SHA256

                              8ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e

                              SHA512

                              d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\b7jtu2fw.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib

                              Filesize

                              1KB

                              MD5

                              688bed3676d2104e7f17ae1cd2c59404

                              SHA1

                              952b2cdf783ac72fcb98338723e9afd38d47ad8e

                              SHA256

                              33899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237

                              SHA512

                              7a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\b7jtu2fw.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig

                              Filesize

                              1KB

                              MD5

                              937326fead5fd401f6cca9118bd9ade9

                              SHA1

                              4526a57d4ae14ed29b37632c72aef3c408189d91

                              SHA256

                              68a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81

                              SHA512

                              b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\b7jtu2fw.default-release\prefs-1.js

                              Filesize

                              8KB

                              MD5

                              001a59054bb0b7ffaa7746c29b55492e

                              SHA1

                              3891dfb89a95fd67a8816ad22099bd01e70ac08c

                              SHA256

                              21b66cb27db86e60d62e3f1e3ea28e049d520ac571c6ed23ad0a65ca0fb5ddc1

                              SHA512

                              3508e7c2acfce37d729028af23efd2ed981380e06a2d60677cd9015cb7b5488706568c269c543c63d4f5881e3b94b3ecc87a249b6792b377fb6367966efaf608

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\b7jtu2fw.default-release\prefs-1.js

                              Filesize

                              6KB

                              MD5

                              4f1add2e881d014f770f60502c64f19e

                              SHA1

                              1a45a2da1310e997df15f654b7e92c52d95dd38a

                              SHA256

                              fbda3179801ae45f2850a8e3ea3e1f73f4e7da5a37e140c0f9f6b0fb20da83f1

                              SHA512

                              a796937995e70dff3c9ddc236b32e9aaf882230b2b77f866c176903bf6d34825edac80074226f8b549f2a3f162ea0135ca19e90cacf5cd3c60bb885b8f8ca25a

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\b7jtu2fw.default-release\prefs.js

                              Filesize

                              6KB

                              MD5

                              139d18aca7a0cded410fd6d1a6134b63

                              SHA1

                              2280bea4efbf6b8302b2fd20deadd15dee4788e9

                              SHA256

                              b529fbf17b7cda61f5eec36bb0b470f5fccb9edc5f4c70317e0288be04f71e46

                              SHA512

                              50b05786291fd63c5a02cc74136588572bbfa65e2305e1d2452bea353aed72455519319f9b05dea51794c0ca107987e4af09cf8ba44ab11350169e865b2936db

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\b7jtu2fw.default-release\sessionstore-backups\recovery.jsonlz4

                              Filesize

                              1KB

                              MD5

                              bba82d18d0907d7e2f20cd4246e37f6b

                              SHA1

                              c450b576c9a85d24a1b5485fafb6a913b68ab6c0

                              SHA256

                              25c811b24fea62656bb1624526efe04b56b843aa37d6ae1c8d3aa10d40c6417b

                              SHA512

                              60aaa2d02a2c6089526c557521f3036057bff19bc71bbb050e826d84a40633648d5a4ac42dc2f8d8ff7104961023cdbf907cc34768940feb8d1f2efed5ab8b8c

                            • memory/4324-36-0x000002DC2D5F0000-0x000002DC2D5F1000-memory.dmp

                              Filesize

                              4KB

                            • memory/4324-16-0x000002DC25140000-0x000002DC25150000-memory.dmp

                              Filesize

                              64KB

                            • memory/4324-0-0x000002DC25040000-0x000002DC25050000-memory.dmp

                              Filesize

                              64KB

                            • memory/4324-32-0x000002DC2D4B0000-0x000002DC2D4B1000-memory.dmp

                              Filesize

                              4KB

                            • memory/4324-34-0x000002DC2D4E0000-0x000002DC2D4E1000-memory.dmp

                              Filesize

                              4KB

                            • memory/4324-35-0x000002DC2D4E0000-0x000002DC2D4E1000-memory.dmp

                              Filesize

                              4KB