Analysis
-
max time kernel
16s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2023 13:28
Static task
static1
Behavioral task
behavioral1
Sample
a3b2ac28fb71d8461b6c90327fabb5a1.js
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
a3b2ac28fb71d8461b6c90327fabb5a1.js
Resource
win10v2004-20231215-en
General
-
Target
a3b2ac28fb71d8461b6c90327fabb5a1.js
-
Size
904KB
-
MD5
a3b2ac28fb71d8461b6c90327fabb5a1
-
SHA1
033bf48edff207df74d6b78410040f391750db8f
-
SHA256
e33df6ad1c1f683b5fe7dd5edfe1d0f9e246ab41364b3f6ae297e717a5ff8026
-
SHA512
4174fd12ac86611280ffb1c3afaffbeb1c888f7835747738dba38cce5c75093c6831bb509236839fb67931bc77f925575e418d89bf295e8265d0987b266efc89
-
SSDEEP
12288:Ms4IgvqEHGaezYf9R/sT1FmyPNweSj0UViZvc7CuvJzQdypXTjafMvjkyK0rcbtb:MND8akYlR/g+XCuBLjyMv4yWjPjb
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lrsFyEuHKj.js WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lrsFyEuHKj.js WScript.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 2196 icacls.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SEJOKAOI5S = "\"C:\\Users\\Admin\\AppData\\Roaming\\lrsFyEuHKj.js\"" WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000_Classes\Local Settings wscript.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2640 wrote to memory of 3724 2640 wscript.exe 90 PID 2640 wrote to memory of 3724 2640 wscript.exe 90 PID 2640 wrote to memory of 4776 2640 wscript.exe 91 PID 2640 wrote to memory of 4776 2640 wscript.exe 91 PID 4776 wrote to memory of 2196 4776 javaw.exe 93 PID 4776 wrote to memory of 2196 4776 javaw.exe 93
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\a3b2ac28fb71d8461b6c90327fabb5a1.js1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\lrsFyEuHKj.js"2⤵
- Drops startup file
- Adds Run key to start application
PID:3724
-
-
C:\Program Files\Java\jre-1.8\bin\javaw.exe"C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\lwuxrwogxx.txt"2⤵
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M3⤵
- Modifies file permissions
PID:2196
-
-
C:\Program Files\Java\jre-1.8\bin\java.exe"C:\Program Files\Java\jre-1.8\bin\java.exe" -jar C:\Users\Admin\AppData\Local\Temp\_0.139829475948636825895116590651878677.class3⤵PID:2680
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD549c00ed2c72471a7a032119f6ed708ca
SHA10fbda1dbc9d4a8b93bbdf4429c825bdbb238748c
SHA25612f2fce8c99dd77864fe8fc12ee2ea8238a5276b561ffe9671697cd0362ed8f8
SHA5126f2dd98e8be1f28f1214cae4fd15c870b97ad040de809e8fd24c9759b30309c399ae498b5476927b2a58fa588997b399d5d320f2d5841b87daf8f691d034aa0b
-
Filesize
241KB
MD5781fb531354d6f291f1ccab48da6d39f
SHA19ce4518ebcb5be6d1f0b5477fa00c26860fe9a68
SHA25697d585b6aff62fb4e43e7e6a5f816dcd7a14be11a88b109a9ba9e8cd4c456eb9
SHA5123e6630f5feb4a3eb1dac7e9125ce14b1a2a45d7415cf44cea42bc51b2a9aa37169ee4a4c36c888c8f2696e7d6e298e2ad7b2f4c22868aaa5948210eb7db220d8
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3791175113-1062217823-1177695025-1000\83aa4cc77f591dfc2374580bbd95f6ba_7b8f07fe-a7f0-4575-9cf9-ed7e955e46ae
Filesize45B
MD5c8366ae350e7019aefc9d1e6e6a498c6
SHA15731d8a3e6568a5f2dfbbc87e3db9637df280b61
SHA25611e6aca8e682c046c83b721eeb5c72c5ef03cb5936c60df6f4993511ddc61238
SHA51233c980d5a638bfc791de291ebf4b6d263b384247ab27f261a54025108f2f85374b579a026e545f81395736dd40fa4696f2163ca17640dd47f1c42bc9971b18cd
-
Filesize
10KB
MD51ba75bca44a20a321cea4e496ce91a85
SHA15a14b44b498f56cbe7b248c537479c845ff465c6
SHA2564035eee1e50075cfcaf233c8d0511dfeeeb01870b1a4baf4a43e9b37a03cc804
SHA5122aaf2cafe8951a03e81d56eadb1d83516a9fc986d7ce6e8aa9a2704da1916feb900b42e271979cdfd0c8852ed2fa17c948a394d3e5977a47e2140fcb2d945481
-
Filesize
473KB
MD557845a03f0630d3fbb9caa203e940935
SHA19c4bb48d46593af760ddb9aec6160e2f379e99f7
SHA25685e1a1df9973a080afe6a11d338a36994732a40cf9f891ec7f2b69dc56aed19f
SHA5127ede78b67b49d91d13ab3eb642874263899231d1c4fbb1fa5575f8c904f46fb32091986b9bd9f2824859f6e6748f112314e745f0ac858d08f3a3b9b152ee64e1