Overview
overview
10Static
static
1½�...�/1.js
windows7-x64
10½�...�/1.js
windows10-2004-x64
10½�.../10.js
windows7-x64
8½�.../10.js
windows10-2004-x64
8½�.../11.js
windows7-x64
3½�.../11.js
windows10-2004-x64
8½�.../12.js
windows7-x64
8½�.../12.js
windows10-2004-x64
8½�.../13.js
windows7-x64
3½�.../13.js
windows10-2004-x64
8½�.../14.js
windows7-x64
3½�.../14.js
windows10-2004-x64
8½�.../15.js
windows7-x64
10½�.../15.js
windows10-2004-x64
10½�.../16.js
windows7-x64
10½�.../16.js
windows10-2004-x64
10½�.../17.js
windows7-x64
3½�.../17.js
windows10-2004-x64
7½�.../18.js
windows7-x64
3½�.../18.js
windows10-2004-x64
7½�.../19.js
windows7-x64
3½�.../19.js
windows10-2004-x64
8½�...�/2.js
windows7-x64
10½�...�/2.js
windows10-2004-x64
10½�.../20.js
windows7-x64
10½�.../20.js
windows10-2004-x64
10½�.../21.js
windows7-x64
1½�.../21.js
windows10-2004-x64
1½�.../22.js
windows7-x64
10½�.../22.js
windows10-2004-x64
10½�.../23.js
windows7-x64
3½�.../23.js
windows10-2004-x64
8Analysis
-
max time kernel
142s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14-10-2023 03:57
Static task
static1
Behavioral task
behavioral1
Sample
½ļ/1.js
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
½ļ/1.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral3
Sample
½ļ/10.js
Resource
win7-20230831-en
Behavioral task
behavioral4
Sample
½ļ/10.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral5
Sample
½ļ/11.js
Resource
win7-20230831-en
Behavioral task
behavioral6
Sample
½ļ/11.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral7
Sample
½ļ/12.js
Resource
win7-20230831-en
Behavioral task
behavioral8
Sample
½ļ/12.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral9
Sample
½ļ/13.js
Resource
win7-20230831-en
Behavioral task
behavioral10
Sample
½ļ/13.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral11
Sample
½ļ/14.js
Resource
win7-20230831-en
Behavioral task
behavioral12
Sample
½ļ/14.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral13
Sample
½ļ/15.js
Resource
win7-20230831-en
Behavioral task
behavioral14
Sample
½ļ/15.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral15
Sample
½ļ/16.js
Resource
win7-20230831-en
Behavioral task
behavioral16
Sample
½ļ/16.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral17
Sample
½ļ/17.js
Resource
win7-20230831-en
Behavioral task
behavioral18
Sample
½ļ/17.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral19
Sample
½ļ/18.js
Resource
win7-20230831-en
Behavioral task
behavioral20
Sample
½ļ/18.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral21
Sample
½ļ/19.js
Resource
win7-20230831-en
Behavioral task
behavioral22
Sample
½ļ/19.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral23
Sample
½ļ/2.js
Resource
win7-20230831-en
Behavioral task
behavioral24
Sample
½ļ/2.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral25
Sample
½ļ/20.js
Resource
win7-20230831-en
Behavioral task
behavioral26
Sample
½ļ/20.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral27
Sample
½ļ/21.js
Resource
win7-20230831-en
Behavioral task
behavioral28
Sample
½ļ/21.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral29
Sample
½ļ/22.js
Resource
win7-20230831-en
Behavioral task
behavioral30
Sample
½ļ/22.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral31
Sample
½ļ/23.js
Resource
win7-20230831-en
Behavioral task
behavioral32
Sample
½ļ/23.js
Resource
win10v2004-20230915-en
General
-
Target
½ļ/17.js
-
Size
1KB
-
MD5
840422981206fe204ad674b563497eee
-
SHA1
fbadcc5fa1e489d965591d769da3bf7039fc5b7f
-
SHA256
76522e1121f296222f3a9c9913638e5e6e9ab4be9206fc86ed32c1827b44b689
-
SHA512
8cc95a62d66b7afcb8f402b4603773a3d3b877cdbf0c07492f75cc3b5bfc6e5cb91aa0997509b0e939a187ad8037d766ba23a4c3758da94a31940a4fc348d9ee
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000044e7540fef135e499edf4eab70c71d2f0000000002000000000010660000000100002000000046c8d860defb3e36866874219ab044755dd5854f2fcb089de1e0fe0f01103336000000000e8000000002000020000000773bb55c05da0b8ff5ecc8fa7261a59e425f7d305c3e0124f5f1bda9437274492000000097d5766227ab4ee1f58c71129710f8b6a158d6cf79c27b0f8b63f38d59ed3d21400000009532ad63ff997b4890c6cd9209308e232fb7cb2f2c0d71f801fff5f747ed33d01159fe09a18beec5f6b905af52924d53e571c3261fa48f0e38f1791f1e62267b iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0026d695a5e7d901 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{E7F0F332-6A45-11EE-9D98-7257CD168FAC} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 504ab295a5e7d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "401527577" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000044e7540fef135e499edf4eab70c71d2f000000000200000000001066000000010000200000003651af86a1e78d093421cc82394ce6cdbd61d8f9ff6bc4822498f5ee5bebab2d000000000e8000000002000020000000603b77c93502c5f9bba8710e047bb58f72f95af0bf682ebb540bdc8da027cd7e200000009958c44fc70ada6d006e1520bdfc157be00915e5638d3da426b7e961498ff35440000000e8c725959de148d0c7582451fa8a7b6e76b89de78169339ec0afd527ddfdfef4515d965c863baff5fd31050d1bd972667008d25d87fdd31216f141b0f94edba3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4436 powershell.exe 4400 powershell.exe 4400 powershell.exe 4436 powershell.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4436 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4436 powershell.exe Token: SeDebugPrivilege 4400 powershell.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4948 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4948 iexplore.exe 4948 iexplore.exe 1844 IEXPLORE.EXE 1844 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 4948 wrote to memory of 1844 4948 iexplore.exe 85 PID 4948 wrote to memory of 1844 4948 iexplore.exe 85 PID 4948 wrote to memory of 1844 4948 iexplore.exe 85 PID 4468 wrote to memory of 4400 4468 wscript.exe 88 PID 4468 wrote to memory of 4400 4468 wscript.exe 88 PID 4468 wrote to memory of 4436 4468 wscript.exe 89 PID 4468 wrote to memory of 4436 4468 wscript.exe 89
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\½ļ\17.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Can’t reach this page Can’t reach this page Make sure the web address http://hqnwha.xyz is correct Search for this site on Bing Refresh the page Check that all network cables are plugged in. Verify that airplane mode is turned off. Make sure your wireless switch is turned on. See if you can connect to mobile broadband. Restart your router. More information <id id="moreInformation">More information</id> The DNS server might be having problems. Error Code: INET_E_RESOURCE_NOT_FOUND Fix connection problems2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4400
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Move-Item 'C:\Users\Admin\AppData\Local\Temp\½ļ\17.js' 'C:\Users\Admin\\AppData\\Roaming\\Microsoft\\Windows\Start Menu\Programs\Startup\'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
PID:4436
-
-
C:\Program Files (x86)\Internet Explorer\ielowutil.exe"C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding1⤵PID:2620
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4948 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1844
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD56cf293cb4d80be23433eecf74ddb5503
SHA124fe4752df102c2ef492954d6b046cb5512ad408
SHA256b1f292b6199aa29c7fafbca007e5f9e3f68edcbbca1965bc828cc92dc0f18bb8
SHA5120f91e2da0da8794b9797c7b50eb5dfd27bde4546ceb6902a776664ce887dd6f12a0dd8773d612ccc76dfd029cd280778a0f0ae17ce679b3d2ffd968dd7e94a00
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
944B
MD5d28a889fd956d5cb3accfbaf1143eb6f
SHA1157ba54b365341f8ff06707d996b3635da8446f7
SHA25621e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45
SHA5120b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82