Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 02:04
Static task
static1
Behavioral task
behavioral1
Sample
23d1f183e50e7ea2393fa5eded265813.js
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
23d1f183e50e7ea2393fa5eded265813.js
Resource
win10v2004-20231215-en
General
-
Target
23d1f183e50e7ea2393fa5eded265813.js
-
Size
32KB
-
MD5
23d1f183e50e7ea2393fa5eded265813
-
SHA1
a85f64b11fe641fd18bb4b79f2779b11dd4c0869
-
SHA256
47fd8e31ecf0c8243056163d6e17962156875c680d534756f4155e478526d2bb
-
SHA512
740fd98898e225fe70f107c21eab6867436054e152e58828be39f0de022fc670150add5b6034a3bae3b91af91dacbfb230d47732c4b4fb7bfefee8a0175fef43
-
SSDEEP
768:Ic41Uru47JvsonG/SOWrey516BGpJiuoEY03l83:4UFUoTezMpJiqU
Malware Config
Signatures
-
Blocklisted process makes network request 6 IoCs
flow pid Process 4 2576 wscript.exe 37 2576 wscript.exe 60 2576 wscript.exe 77 2576 wscript.exe 93 2576 wscript.exe 98 2576 wscript.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MuCMRJfbWc.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MuCMRJfbWc.js wscript.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SEJOKAOI5S = "\"C:\\Users\\Admin\\AppData\\Roaming\\MuCMRJfbWc.js\"" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4536 wrote to memory of 4412 4536 wscript.exe 19 PID 4536 wrote to memory of 4412 4536 wscript.exe 19 PID 4536 wrote to memory of 2576 4536 wscript.exe 18 PID 4536 wrote to memory of 2576 4536 wscript.exe 18
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\23d1f183e50e7ea2393fa5eded265813.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" "C:\Users\Admin\AppData\Local\Temp\VLK.vbs"2⤵
- Blocklisted process makes network request
PID:2576
-
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\MuCMRJfbWc.js"2⤵
- Drops startup file
- Adds Run key to start application
PID:4412
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD56dfc3b5e6d03b18f354fca422f625c72
SHA1b62e9bd385f2ab06fc0fa0bcf48ef41b6cd5bc1d
SHA2562f47caad055b12872d1501f273fe4b86bb641a1f9c1f257dcb0c12f70c1870a9
SHA51265dc64def37722cadd37bd0020d18b30697fe36a5a402f775d4bf3975066064264189cb39d09d25d57cfe86ef33b1ce1b16aa8ae8c780bb4e6e80fd794fa0ba9
-
Filesize
10KB
MD5ef6faacbf40e1fe1de245177065a4f68
SHA1d3d4baa744b10d39ddb7b4e048e18149d689e47c
SHA2565b5fe15c592a94116c3aca25c92c8e17b16245898bb3557a620449a16091a2d9
SHA512dbd55abb487f5860ea4d8517092acd80c508aa69b9a6f6876465d80d5cb8dfdaed02619f6459c23a43781da6d23efc3998a1f9b4c11e2ddbe5b4b1e36a5af9ab