Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2023 13:40
Static task
static1
Behavioral task
behavioral1
Sample
a9b85388aae2c05a662703488dc484b0.js
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
a9b85388aae2c05a662703488dc484b0.js
Resource
win10v2004-20231215-en
General
-
Target
a9b85388aae2c05a662703488dc484b0.js
-
Size
910KB
-
MD5
a9b85388aae2c05a662703488dc484b0
-
SHA1
461f673f7af1f372e42fd4e8e6edbd60ddbb5dc7
-
SHA256
39a2e082897abaaf11cc9e955d4b1dff633be28a0be463b748c3bd6dc6dfd6ec
-
SHA512
abd01d08176c3fd6e45407f9222d5b02d60d719ea82366c4431282a1779e28cedeb4923f0c897e8d9df3b3ee3f05d10c509c0e3861119f8a712b9cca809384a7
-
SSDEEP
12288:eIziPJqueLX4tD3WYFztROhdbmtdPzNiXPLqnqXHBIqRNMeM3VJcSTj/qrqx9W9y:eIeoq3WYZPtdPzE5NWfhqrAIMfCPA
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vTTsXwVcli.js WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vTTsXwVcli.js WScript.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 3484 icacls.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SEJOKAOI5S = "\"C:\\Users\\Admin\\AppData\\Roaming\\vTTsXwVcli.js\"" WScript.exe -
Drops file in Program Files directory 24 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jre-1.8\bin\server\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\dll\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\symbols\dll\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\dll\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\symbols\dll\ntdll.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\dll\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\symbols\dll\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\ntdll.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\dll\ntdll.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\dll\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\dll\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\symbols\dll\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\dll\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\symbols\dll\ntdll.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\symbols\dll\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\symbols\dll\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\symbols\dll\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\dll\ntdll.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ntdll.pdb java.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\Local Settings wscript.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2512 javaw.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1592 wrote to memory of 3748 1592 wscript.exe 92 PID 1592 wrote to memory of 3748 1592 wscript.exe 92 PID 1592 wrote to memory of 2512 1592 wscript.exe 90 PID 1592 wrote to memory of 2512 1592 wscript.exe 90 PID 2512 wrote to memory of 3484 2512 javaw.exe 94 PID 2512 wrote to memory of 3484 2512 javaw.exe 94 PID 2512 wrote to memory of 2924 2512 javaw.exe 96 PID 2512 wrote to memory of 2924 2512 javaw.exe 96
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\a9b85388aae2c05a662703488dc484b0.js1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Program Files\Java\jre-1.8\bin\javaw.exe"C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\pyfytqwwit.txt"2⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M3⤵
- Modifies file permissions
PID:3484
-
-
C:\Program Files\Java\jre-1.8\bin\java.exe"C:\Program Files\Java\jre-1.8\bin\java.exe" -jar C:\Users\Admin\AppData\Local\Temp\_0.66013614187970587316525621065209896.class3⤵
- Drops file in Program Files directory
PID:2924
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\vTTsXwVcli.js"2⤵
- Drops startup file
- Adds Run key to start application
PID:3748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD5138c81d7882c1409ed74891bf4afc8ea
SHA1f8d026f62fbfcb4f3d71702edd395996a94205a8
SHA256090b7c28f5985540d18190b1ade2bd1d9e370325a9613229778ab5590488e894
SHA512ffcf06c36740ba8778a5657735d485c353bc6c872d644cfffc1e37643d5ee92a331ef1a4e2a3a17cd4395ae7647daae8654e5745afb8064a5164476ff01550c0
-
Filesize
128KB
MD54c1bd01b73d68be5a48b977bb4a61948
SHA1ff07cf5cc64c55f1b4c010e87763087dd9ffb146
SHA256a4298bd9f17d202dd9cb60ab434bbf2cb0a36d54ff15912a1a2ca7476aef8337
SHA512b0f1bfd417b5567b4e4c7e26249163e21f5292b4bebd4b84a334e95bfb9ebdfe0e265dd9f35506aae2680839697cd4ad4cf6e35bc248016efd6c3e5346abbe3c
-
Filesize
347KB
MD5d1b31b33fbef7e4cf8e9d2c409b4786f
SHA1dab9a1434d99d0c4283814c61413dc92af6c550c
SHA2569997466007ec3eeddd237302f97eeff7cadcb8643cad2e5c739353d76e57dbe3
SHA512779c0d0b3257328233a538c8909791012da33ab31b813074d3c2149d274d638bb42e41fd5b3fbc3fa0cf3aa2d3b080f51cbf6fc7eb5aec201e087dead7dc10b8
-
Filesize
9KB
MD5e068ea577e83f36e6f5a3a64bd763648
SHA183764893b98e89350c261609b76b0fd812b44630
SHA256d75a2e8e930b82f2cf2e751b298294f5594d74ff68aa65ca27ff6c1eb46730b6
SHA512ed0d2fa859b239f84d736dc138a9a7c100cececdf565ed6a2d401ef9f20b526feffee4587eaf93697d9bb7db33f8bc8eb91a66d70b08645b913d1f6edcea47c6