Analysis
-
max time kernel
153s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
01-01-2024 19:57
Static task
static1
Behavioral task
behavioral1
Sample
0982fc211767a61d7a3ef26ad2405be6.js
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0982fc211767a61d7a3ef26ad2405be6.js
Resource
win10v2004-20231215-en
General
-
Target
0982fc211767a61d7a3ef26ad2405be6.js
-
Size
200KB
-
MD5
0982fc211767a61d7a3ef26ad2405be6
-
SHA1
e00d78a7ac396441217c133ba728af2a7aa67c9d
-
SHA256
c0d0da52fab57a9a3ac346e9aa1427c6f08198c2ef8f1f4ed9f556abc736cc52
-
SHA512
a3b15291adb751a83386b1ba0cf1fd89843237a7f4ce6402a11a5099a8f18f8caa652842532310c768734ff670f46df28da8893c869a8e564a17268c13897d57
-
SSDEEP
3072:MIyNq6qDEs1LBG0J9DaDr0M4Uf+XZ8qwivPZUheXdvoX3FOL3oReKN:+bs1td9DaDKU2JVDvRU6dvSOsIKN
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\iZuOkORefJ.js WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\iZuOkORefJ.js WScript.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 4640 icacls.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SEJOKAOI5S = "\"C:\\Users\\Admin\\AppData\\Roaming\\iZuOkORefJ.js\"" WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000_Classes\Local Settings wscript.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5000 wrote to memory of 3164 5000 wscript.exe 87 PID 5000 wrote to memory of 3164 5000 wscript.exe 87 PID 5000 wrote to memory of 1132 5000 wscript.exe 90 PID 5000 wrote to memory of 1132 5000 wscript.exe 90 PID 1132 wrote to memory of 4640 1132 javaw.exe 93 PID 1132 wrote to memory of 4640 1132 javaw.exe 93
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\0982fc211767a61d7a3ef26ad2405be6.js1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\iZuOkORefJ.js"2⤵
- Drops startup file
- Adds Run key to start application
PID:3164
-
-
C:\Program Files\Java\jre-1.8\bin\javaw.exe"C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\zqpqefompj.txt"2⤵
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M3⤵
- Modifies file permissions
PID:4640
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD5f3d7c98b8911e285aa5e79f2535cd6d0
SHA16b8cc427c0934cd10ac37339d2f02009eb60dde1
SHA25688dfa6bd0d83b5c0936e2a3047ad46c583f8cdb6d8c1cd51225e729d451675f1
SHA51292ac6e4677250dc36fe436fbc9ccc4e0b260fc099e56805c05f145c493ef1b7989d3d53f27133a7146167f264b69f82ba3f511a215cc78890cb722d2d4e81fd6
-
Filesize
9KB
MD5ba88b3aeea9cd6596528119b0a81e127
SHA1af06129ded6c4e82b5c16607c3cbae77691d8407
SHA2567417fe426dc695b070d697d4cd2add731e80cab5bd1f15ae01c26d3bf7ff6812
SHA5124deb61ea7ea3a5cec8fee42e878cc3704375f05ff3c68ae1cc7154885919c2f3952e22a042d716efe4277041f9384203f13308f1e9ce7338139cb4d314424d38
-
Filesize
92KB
MD52e458a59025b390fbdf7d3717314b507
SHA1d5a84f501bfa81682ebde5e31a68794140141785
SHA2566b723bd260b53c68c716ef218c78718d3e99ab4d4238a4bd823fd0cd6ec8007b
SHA5122b463bc4ef98264560abad47053549c463fc9ee098c97cd60d58c959ba67f4ddf2ca60856f6564802a9f056740fbedbb6bdc829388c136c13b334563465d1f22