Analysis
-
max time kernel
153s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
21-12-2023 22:40
Static task
static1
Behavioral task
behavioral1
Sample
17a841e42f40423054ffebc9b5e61103.js
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
17a841e42f40423054ffebc9b5e61103.js
Resource
win10v2004-20231215-en
General
-
Target
17a841e42f40423054ffebc9b5e61103.js
-
Size
218KB
-
MD5
17a841e42f40423054ffebc9b5e61103
-
SHA1
8c51a8dcd3580b80ceb7b9d90d19853c77bcb3eb
-
SHA256
145f869eddd77064bf0238142318242b67d4b8f0d731595a2c85560696486ea6
-
SHA512
4a80a7b1905734e961a1d9e0210f77be62ca6f5002f2a7d5a2f755b4c23eb693ccea593a910bcb6c723f02e3f1f4c83dda07e8a710131b79fd2e41a558ecdc66
-
SSDEEP
3072:wYrEQw480xR5JClJsw4Kd9CPSqSgPCamwYBOz++ucpqH5PSfL2a5YgjTZctPUIw5:qQq0P5SGwrG6qBnpucpqZPoP5YKZTV
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\huhTRxnPDW.js WScript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\huhTRxnPDW.js WScript.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 3992 icacls.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SEJOKAOI5S = "\"C:\\Users\\Admin\\AppData\\Roaming\\huhTRxnPDW.js\"" WScript.exe -
Drops file in Program Files directory 12 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jre-1.8\bin\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\symbols\dll\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\dll\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\symbols\dll\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\dll\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\symbols\dll\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\dll\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\dll\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\symbols\dll\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\jvm.pdb javaw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000_Classes\Local Settings wscript.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4772 wrote to memory of 1240 4772 wscript.exe 90 PID 4772 wrote to memory of 1240 4772 wscript.exe 90 PID 4772 wrote to memory of 632 4772 wscript.exe 91 PID 4772 wrote to memory of 632 4772 wscript.exe 91 PID 632 wrote to memory of 3992 632 javaw.exe 94 PID 632 wrote to memory of 3992 632 javaw.exe 94
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\17a841e42f40423054ffebc9b5e61103.js1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\huhTRxnPDW.js"2⤵
- Drops startup file
- Adds Run key to start application
PID:1240
-
-
C:\Program Files\Java\jre-1.8\bin\javaw.exe"C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\rrgmazo.txt"2⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M3⤵
- Modifies file permissions
PID:3992
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD5d0cb11fbf4eb5a7f1e28d6642324a9e6
SHA1c59bd55b1003d8cca8905485e570b0b7e656ab2b
SHA256fd2688c850ccbdaadcb9b85fd6692b7864949c4f04a059bb731843563c594b7b
SHA5126d176e392e639f03c991f3f8c116783dd66274a5e8f7993183f99301d24eabe99e307fba85a2b80cd5ccaee4aa3d3fd276c00dc322a5a0bf79fa6302a14a5661
-
Filesize
9KB
MD5751a1e074de98bcbbf4bfc91cc6dcf7e
SHA1d225c87ba8d6e5d4ce0186b978801221c762e5e4
SHA2564d1c15c3b7a5f3b6d40947e82cb9f8f42235274ccf31b6cb3ae635b0fc2b7605
SHA512b55d3017d3386733c255652a682287082bb05508324db33b93dddaec7bed1c55e0488d9825c292c9a503f7c80e497d04ec1bc2233fa14d15692dfaa151bf54f5
-
Filesize
102KB
MD5d30db43fa4de3d1c86d88199fd218672
SHA1f87e903271b69f5dc3dc5b1da84dca781a838247
SHA256e3c140f5c4fa10ef365115cfa71f73b3a503313cf94068365472bb431e91e7e1
SHA512ba7a5fb9a375a5e1edaf9821d3de2d466a2649cfc4a690170c0c295b7b98fdad9577427a45f6938a7c4ecd827e7554e70175a36f4dfbeb2f7d25f8d22de707ca