Analysis
-
max time kernel
168s -
max time network
179s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 01:49
Static task
static1
Behavioral task
behavioral1
Sample
235c68f406aa41b7e1a87e35d83add4c.js
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
235c68f406aa41b7e1a87e35d83add4c.js
Resource
win10v2004-20231215-en
General
-
Target
235c68f406aa41b7e1a87e35d83add4c.js
-
Size
201KB
-
MD5
235c68f406aa41b7e1a87e35d83add4c
-
SHA1
dadb5bd81a34b437863e3d744ea0a06c48533b39
-
SHA256
9285fa6ba7f6cb35a4371d51a11f7c5c7aa582cb1deec294aff20ec5060b0a2d
-
SHA512
158661fdbd3c48fb3f3dba455833553e0c3c1c64d4007262515a689f755f5b752b34f7ead147834852445f60328e3d66b0ea44bfa79372f1667ea14297fa7d1a
-
SSDEEP
3072:ucygHBboR/hsrTjXCXJiMJexk0/ouyvTXiPbPN4kAx/cdDQaL:5HBb65CyNJexk0oGPD8KRL
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ruYArSxXtj.js WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ruYArSxXtj.js WScript.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 3556 icacls.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SEJOKAOI5S = "\"C:\\Users\\Admin\\AppData\\Roaming\\ruYArSxXtj.js\"" WScript.exe -
Drops file in Program Files directory 12 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jre-1.8\bin\server\dll\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\symbols\dll\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\symbols\dll\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\dll\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\dll\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\symbols\dll\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\dll\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\symbols\dll\jvm.pdb javaw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000_Classes\Local Settings wscript.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4704 wrote to memory of 2516 4704 wscript.exe 89 PID 4704 wrote to memory of 2516 4704 wscript.exe 89 PID 4704 wrote to memory of 1760 4704 wscript.exe 91 PID 4704 wrote to memory of 1760 4704 wscript.exe 91 PID 1760 wrote to memory of 3556 1760 javaw.exe 94 PID 1760 wrote to memory of 3556 1760 javaw.exe 94
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\235c68f406aa41b7e1a87e35d83add4c.js1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\ruYArSxXtj.js"2⤵
- Drops startup file
- Adds Run key to start application
PID:2516
-
-
C:\Program Files\Java\jre-1.8\bin\javaw.exe"C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\jmhefkpxy.txt"2⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M3⤵
- Modifies file permissions
PID:3556
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD545bbde313a610db95aad9256427fc978
SHA19bc9b8890826c7b576c316f4c69d1b6a9083e82c
SHA25694c3d77f55baf77064291915ed9e328826fbdc8f4eb08a22c35446c703ebe978
SHA5121aba04a6a18b6ee9bbf84db030ceb25cdfc1e43fa60f3d86a3da438a8a6f8e2976c1d8d3cf096c375e12ded96a99e8a6d28202f4a55080f6269ad65d523c7ffc
-
Filesize
92KB
MD5ae4f924072e8dd90687607e7becdde2e
SHA1225d2c7cf6506bf59d865fe3dba1b6c1736d492b
SHA256915de15ccb287c58270e6bc23523b0cde9ce077dbc0fef517faca1a1a0313286
SHA51214da1de2af981af4390e3bb95e29f968f0ef67af011202ce9f598e9f553f822e37013301c965f871ad2660cc451fb7c1ad619bf9533405e7424ad88f199803f0
-
Filesize
9KB
MD5ca4e11b0bbf70a587e0d653bfceded8c
SHA1c70eeac3273988740e937e21e11948b003295582
SHA256d0a3dc9322f9f6f9028f437d45757560de849fd0a0a6dcf8c92beed012b61e0d
SHA512291bbeb73d3ecacfe5c50aa9fd59f0542eea4950a82d0def79318017d5a0c9bcd3792a49c17309414c7678235ffeae284f29643e2be4b4a368592c0f5f64bdf0