Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 13:20
Static task
static1
Behavioral task
behavioral1
Sample
37c0373548f1334764a0fe139bc4b0e4.js
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
37c0373548f1334764a0fe139bc4b0e4.js
Resource
win10v2004-20231215-en
General
-
Target
37c0373548f1334764a0fe139bc4b0e4.js
-
Size
202KB
-
MD5
37c0373548f1334764a0fe139bc4b0e4
-
SHA1
bea7360b7252701f1a1411d7a84c9ac631267559
-
SHA256
330d4d4c03364842209ab162eabb72fc9e5aa9c0b7271bd83599cb27f492601c
-
SHA512
bdcd45ccdf92966b5733f286a4608dfb3fc4566715045e80a92edebbf827db3994a91176e8f1945785c0af9d103259c192ae44561fe0c8d5c0286c62c2b0b4e3
-
SSDEEP
3072:kbH2QdessMSnPtHbh42rOYXt5+E2G/UE0Wvidfbwta+sYL8e+FX6HVmgSRn7dKI7:f11HV9OYXtMyH0WCD6a+PYBKI+4jN5lF
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TrvKczAWPy.js WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TrvKczAWPy.js WScript.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 1148 icacls.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SEJOKAOI5S = "\"C:\\Users\\Admin\\AppData\\Roaming\\TrvKczAWPy.js\"" WScript.exe -
Drops file in Program Files directory 12 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jre-1.8\bin\server\dll\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\symbols\dll\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\symbols\dll\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\dll\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\dll\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\symbols\dll\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\symbols\dll\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\dll\jvm.pdb javaw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000_Classes\Local Settings wscript.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4388 wrote to memory of 1196 4388 wscript.exe 88 PID 4388 wrote to memory of 1196 4388 wscript.exe 88 PID 4388 wrote to memory of 3140 4388 wscript.exe 87 PID 4388 wrote to memory of 3140 4388 wscript.exe 87 PID 3140 wrote to memory of 1148 3140 javaw.exe 90 PID 3140 wrote to memory of 1148 3140 javaw.exe 90
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\37c0373548f1334764a0fe139bc4b0e4.js1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Program Files\Java\jre-1.8\bin\javaw.exe"C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\felllqf.txt"2⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3140 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M3⤵
- Modifies file permissions
PID:1148
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\TrvKczAWPy.js"2⤵
- Drops startup file
- Adds Run key to start application
PID:1196
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD518770438f6e7e7c0c95c6ecd43f2e30f
SHA1fb6fb5110cf1afef2e612d5fd5b37fd5ad4bc8da
SHA2562ff4dc455baee309ad13eb2c10eda245f582de9c29e58d94430bfc0f68867cdb
SHA512ea83006e7b00c0f30a2b9c571d682bc19925145ffe457868157d5c607177141068e68e817b82fd029c8406f31baf98b411cef1702db6df0e11527b457048f485
-
Filesize
9KB
MD5cf858266b13ee357cf8f5f5e12151885
SHA17a460ee3ad3c7b42c98676a39412ba5245fa8757
SHA2565929e5fe4b3864ee6d9218b91dd88ca9f8a30a235d3a42ee587d3a1f8ef68a6f
SHA51269075ef84e7ec1ee05faa059d67dd1ce7439e886c83fbb9572858b6a4051cdab96212a0544260fd2a3d257534908e17c46c480c96b455686b133b9a565e09058
-
Filesize
92KB
MD53e93005e30804f380c9c3fb392c32e4d
SHA168b3a053276a14c8059d58eab447927868f2f785
SHA2567d14c63974afd53f32e6b5b5d22f0e0e6d49e4a04b67b4670ebeaf8c2a658b64
SHA512307f8de410b15e2f28740bf776d27c201d9eebd2a5936757becddfb31ed9724f2ab866bdeac0ddd5184aa91457a276379a0a08fb24830df57d854e5c450fd129