Analysis
-
max time kernel
161s -
max time network
173s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
11-01-2024 20:09
Static task
static1
Behavioral task
behavioral1
Sample
53d9dc9fa9cc34f33fe03b7c5f5fce6b.js
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
53d9dc9fa9cc34f33fe03b7c5f5fce6b.js
Resource
win10v2004-20231215-en
General
-
Target
53d9dc9fa9cc34f33fe03b7c5f5fce6b.js
-
Size
1.1MB
-
MD5
53d9dc9fa9cc34f33fe03b7c5f5fce6b
-
SHA1
8d906ed4bfd58c0220765721298ce2e75256b568
-
SHA256
2501e01c4f196967e005c2969f1d692ca8adcb24a23c5d6fb13f9a0b71f2d8c8
-
SHA512
baa55aa8cad643bf63ef21b6413d4bd3fb92c702588f95b650187b06189ae2a191945a777856662fd5d0801115700e4c7a6de3143b1e03a5bb666040bfdb1ca7
-
SSDEEP
24576:VnnSnOBVKSjE0WomnrAXLjEYwbsC6fwC1prbsHn0NO2IOU:lcnraeWHrAg0J
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FXdRinYHQL.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FXdRinYHQL.js wscript.exe -
Executes dropped EXE 1 IoCs
pid Process 1192 NEW COPY DOC_SCANNED ORDER_AUG_IMG_6210332111_CIF_EXW.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SEJOKAOI5S = "\"C:\\Users\\Admin\\AppData\\Roaming\\FXdRinYHQL.js\"" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3644 wrote to memory of 3216 3644 wscript.exe 93 PID 3644 wrote to memory of 3216 3644 wscript.exe 93 PID 3644 wrote to memory of 1192 3644 wscript.exe 94 PID 3644 wrote to memory of 1192 3644 wscript.exe 94 PID 3644 wrote to memory of 1192 3644 wscript.exe 94
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\53d9dc9fa9cc34f33fe03b7c5f5fce6b.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\FXdRinYHQL.js"2⤵
- Drops startup file
- Adds Run key to start application
PID:3216
-
-
C:\Users\Admin\AppData\Roaming\NEW COPY DOC_SCANNED ORDER_AUG_IMG_6210332111_CIF_EXW.exe"C:\Users\Admin\AppData\Roaming\NEW COPY DOC_SCANNED ORDER_AUG_IMG_6210332111_CIF_EXW.exe"2⤵
- Executes dropped EXE
PID:1192
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD5aaaad4740541507c2973b037f8bd605d
SHA152c00b23e70731ef08bfb590d7cc8f0bd48bdb60
SHA256e577630c07a417270fd23da46f477da5b6ca3a059abbb26befe750418e860fce
SHA512ca9e073a91c1f761ddfb047a662a4a2a2ca6c50f5cfe41c7919185e8d1d41f13d8ce1240f68accf4c7909702a4d369d178b05cfd7c927086f1b6fad380ba1a18
-
Filesize
619KB
MD54255e9ead1e7fe49993169f7136069f4
SHA1e936b187eb244006e9868a8491dfc267e5f71292
SHA256b8daa1f10978ebc4a615f241f783cbdf7a5f90f3e5ea686c90809708aef14848
SHA512a27b3bfd2885589a2f201a7c31e1218cf9c4d895d30bb3a3104b36973030b61b1884c9925ca50301b52ac521c6f416b1e5ba3add897bc229bc397ce54f0e0e4e