Analysis
-
max time kernel
34s -
max time network
175s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2023 13:16
Static task
static1
Behavioral task
behavioral1
Sample
9da6b45d17e4c0ef80df356e1a7e6bdf.js
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9da6b45d17e4c0ef80df356e1a7e6bdf.js
Resource
win10v2004-20231215-en
General
-
Target
9da6b45d17e4c0ef80df356e1a7e6bdf.js
-
Size
200KB
-
MD5
9da6b45d17e4c0ef80df356e1a7e6bdf
-
SHA1
5bf501a2ce339671a28d1ecea943c5bb817962b6
-
SHA256
1d61ac748d5d297ca8fa771d12a1c79626c6e2c217a8a349b4ade54c09ae589b
-
SHA512
f4249a1bc09eff66e058a736cbae688c6f7a56391f0fdaaca0056a94098442761e12022c10870a8a5cac99d6af51daab747244bb4dfbc33a89fef1f74f12a788
-
SSDEEP
3072:cXYHwujfPHfCjTutr4QMuHNjmvXSG7H+jJbE2bve+5OsF1S4PM:A+f/fCnKr4PcNjmviGEC2bb1H5M
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\otOJexNvvn.js WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\otOJexNvvn.js WScript.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 2324 icacls.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SEJOKAOI5S = "\"C:\\Users\\Admin\\AppData\\Roaming\\otOJexNvvn.js\"" WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000_Classes\Local Settings wscript.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2544 wrote to memory of 2228 2544 wscript.exe 91 PID 2544 wrote to memory of 2228 2544 wscript.exe 91 PID 2544 wrote to memory of 4804 2544 wscript.exe 92 PID 2544 wrote to memory of 4804 2544 wscript.exe 92 PID 4804 wrote to memory of 2324 4804 javaw.exe 95 PID 4804 wrote to memory of 2324 4804 javaw.exe 95
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\9da6b45d17e4c0ef80df356e1a7e6bdf.js1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\otOJexNvvn.js"2⤵
- Drops startup file
- Adds Run key to start application
PID:2228
-
-
C:\Program Files\Java\jre-1.8\bin\javaw.exe"C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\trquelilc.txt"2⤵
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M3⤵
- Modifies file permissions
PID:2324
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD5f4e48f7c93d106a73c01e5fde1ba00f9
SHA15abffd481bd53700e05f252abbfa2e50c538539a
SHA2568265892ee37033bf3e03bdcc0c2cdb0c0d90b0b6c7b3db1939af7fce25b28def
SHA5121f8ad99341e7760a84e06d001bc2dbd462a6713102d6e7910d3305590f0e01d70c96022a3b42301a8fdb34dca6db8f4bf744daef1410ed846913258c29d7cd07
-
Filesize
9KB
MD5730e1246285921eac566caa6a0c9b663
SHA12e508ef96d92608971061ff76b520f141a049e78
SHA256aba5bc2432ee098aa4a30e4310ee1a300db7bb28dd4220ebc47f17aed7a17413
SHA5120524474a34a89b4eafb375567b82229f0551e5aedc5ba8b9475397d395370ec84499ff7bcd1dd0698e5ea7300a27560eaeec0824ebc3edc49267326ee843b281
-
Filesize
92KB
MD506f61cd3d0cdf9257fcdac6483d4c1ba
SHA1f4eec20fdbc68dbdd8bb5fd1dfecd918b099ef2f
SHA256424ba40767618afade696d3714c1ba1960ff91e3bc1658fa510cd2332baf2a2f
SHA5129aa7d19fb9999d0414d2399e14ccf43b66cbd6a1bf54be6538b6a0a9e9ac096bdc065a43e4d776ed5cd01a14562446fcd535979b0756781e132e13b27b575657