Analysis
-
max time kernel
588s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
submitted
14/01/2024, 13:57
Static task
static1
Behavioral task
behavioral1
Sample
pa collective agreement pay 28752.js
Resource
win10v2004-20231215-en
General
-
Target
pa collective agreement pay 28752.js
-
Size
840KB
-
MD5
99e87d7f09144d8ba65a3eec479677f4
-
SHA1
80caac27b8d28875be162f939fef9fc67c8d3e7c
-
SHA256
5c2a68774c1148a0c960e374049ae3452086cc32a74455b6dd149d5d54ae8790
-
SHA512
898d4e564bd93b20ab72ca825d4128aed63a5831959307dc2fbe1ec2669acbdcf6ec99e553399087755514ea58a7f2b4dc1679e18b313a1bfd1bc0abb72888f9
-
SSDEEP
24576:fcCgo+ogQc5WfNnZmD/nz1WqgU2e82hT+WpyQT2EFNE3NEr:fcCgo+ogQc5WfNnZmD/nZWqgaaWpyQT1
Malware Config
Signatures
-
GootLoader
JavaScript loader known for delivering other families such as Gootkit and Cobaltstrike.
-
Gootloader family
-
Blocklisted process makes network request 25 IoCs
flow pid Process 57 3844 PowERSHElL.eXe 62 3844 PowERSHElL.eXe 65 3844 PowERSHElL.eXe 68 3844 PowERSHElL.eXe 74 3844 PowERSHElL.eXe 79 3844 PowERSHElL.eXe 84 3844 PowERSHElL.eXe 87 3844 PowERSHElL.eXe 89 3844 PowERSHElL.eXe 91 3844 PowERSHElL.eXe 92 3844 PowERSHElL.eXe 94 3844 PowERSHElL.eXe 100 3844 PowERSHElL.eXe 103 3844 PowERSHElL.eXe 105 3844 PowERSHElL.eXe 106 3844 PowERSHElL.eXe 107 3844 PowERSHElL.eXe 108 3844 PowERSHElL.eXe 116 3844 PowERSHElL.eXe 118 3844 PowERSHElL.eXe 121 3844 PowERSHElL.eXe 122 3844 PowERSHElL.eXe 126 3844 PowERSHElL.eXe 131 3844 PowERSHElL.eXe 136 3844 PowERSHElL.eXe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation wscript.EXE -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ PowERSHElL.eXe Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ PowERSHElL.eXe -
Suspicious behavior: EnumeratesProcesses 50 IoCs
pid Process 3844 PowERSHElL.eXe 3844 PowERSHElL.eXe 3844 PowERSHElL.eXe 3844 PowERSHElL.eXe 3844 PowERSHElL.eXe 3844 PowERSHElL.eXe 3844 PowERSHElL.eXe 3844 PowERSHElL.eXe 3844 PowERSHElL.eXe 3844 PowERSHElL.eXe 3844 PowERSHElL.eXe 3844 PowERSHElL.eXe 3844 PowERSHElL.eXe 3844 PowERSHElL.eXe 3844 PowERSHElL.eXe 3844 PowERSHElL.eXe 3844 PowERSHElL.eXe 3844 PowERSHElL.eXe 3844 PowERSHElL.eXe 3844 PowERSHElL.eXe 3844 PowERSHElL.eXe 3844 PowERSHElL.eXe 3844 PowERSHElL.eXe 3844 PowERSHElL.eXe 3844 PowERSHElL.eXe 3844 PowERSHElL.eXe 3844 PowERSHElL.eXe 3844 PowERSHElL.eXe 3844 PowERSHElL.eXe 3844 PowERSHElL.eXe 3844 PowERSHElL.eXe 3844 PowERSHElL.eXe 3844 PowERSHElL.eXe 3844 PowERSHElL.eXe 3844 PowERSHElL.eXe 3844 PowERSHElL.eXe 3844 PowERSHElL.eXe 3844 PowERSHElL.eXe 3844 PowERSHElL.eXe 3844 PowERSHElL.eXe 3844 PowERSHElL.eXe 3844 PowERSHElL.eXe 3844 PowERSHElL.eXe 3844 PowERSHElL.eXe 3844 PowERSHElL.eXe 3844 PowERSHElL.eXe 3844 PowERSHElL.eXe 3844 PowERSHElL.eXe 3844 PowERSHElL.eXe 3844 PowERSHElL.eXe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3844 PowERSHElL.eXe Token: SeIncreaseQuotaPrivilege 3844 PowERSHElL.eXe Token: SeSecurityPrivilege 3844 PowERSHElL.eXe Token: SeTakeOwnershipPrivilege 3844 PowERSHElL.eXe Token: SeLoadDriverPrivilege 3844 PowERSHElL.eXe Token: SeSystemProfilePrivilege 3844 PowERSHElL.eXe Token: SeSystemtimePrivilege 3844 PowERSHElL.eXe Token: SeProfSingleProcessPrivilege 3844 PowERSHElL.eXe Token: SeIncBasePriorityPrivilege 3844 PowERSHElL.eXe Token: SeCreatePagefilePrivilege 3844 PowERSHElL.eXe Token: SeBackupPrivilege 3844 PowERSHElL.eXe Token: SeRestorePrivilege 3844 PowERSHElL.eXe Token: SeShutdownPrivilege 3844 PowERSHElL.eXe Token: SeDebugPrivilege 3844 PowERSHElL.eXe Token: SeSystemEnvironmentPrivilege 3844 PowERSHElL.eXe Token: SeRemoteShutdownPrivilege 3844 PowERSHElL.eXe Token: SeUndockPrivilege 3844 PowERSHElL.eXe Token: SeManageVolumePrivilege 3844 PowERSHElL.eXe Token: 33 3844 PowERSHElL.eXe Token: 34 3844 PowERSHElL.eXe Token: 35 3844 PowERSHElL.eXe Token: 36 3844 PowERSHElL.eXe Token: SeIncreaseQuotaPrivilege 3844 PowERSHElL.eXe Token: SeSecurityPrivilege 3844 PowERSHElL.eXe Token: SeTakeOwnershipPrivilege 3844 PowERSHElL.eXe Token: SeLoadDriverPrivilege 3844 PowERSHElL.eXe Token: SeSystemProfilePrivilege 3844 PowERSHElL.eXe Token: SeSystemtimePrivilege 3844 PowERSHElL.eXe Token: SeProfSingleProcessPrivilege 3844 PowERSHElL.eXe Token: SeIncBasePriorityPrivilege 3844 PowERSHElL.eXe Token: SeCreatePagefilePrivilege 3844 PowERSHElL.eXe Token: SeBackupPrivilege 3844 PowERSHElL.eXe Token: SeRestorePrivilege 3844 PowERSHElL.eXe Token: SeShutdownPrivilege 3844 PowERSHElL.eXe Token: SeDebugPrivilege 3844 PowERSHElL.eXe Token: SeSystemEnvironmentPrivilege 3844 PowERSHElL.eXe Token: SeRemoteShutdownPrivilege 3844 PowERSHElL.eXe Token: SeUndockPrivilege 3844 PowERSHElL.eXe Token: SeManageVolumePrivilege 3844 PowERSHElL.eXe Token: 33 3844 PowERSHElL.eXe Token: 34 3844 PowERSHElL.eXe Token: 35 3844 PowERSHElL.eXe Token: 36 3844 PowERSHElL.eXe Token: SeIncreaseQuotaPrivilege 3844 PowERSHElL.eXe Token: SeSecurityPrivilege 3844 PowERSHElL.eXe Token: SeTakeOwnershipPrivilege 3844 PowERSHElL.eXe Token: SeLoadDriverPrivilege 3844 PowERSHElL.eXe Token: SeSystemProfilePrivilege 3844 PowERSHElL.eXe Token: SeSystemtimePrivilege 3844 PowERSHElL.eXe Token: SeProfSingleProcessPrivilege 3844 PowERSHElL.eXe Token: SeIncBasePriorityPrivilege 3844 PowERSHElL.eXe Token: SeCreatePagefilePrivilege 3844 PowERSHElL.eXe Token: SeBackupPrivilege 3844 PowERSHElL.eXe Token: SeRestorePrivilege 3844 PowERSHElL.eXe Token: SeShutdownPrivilege 3844 PowERSHElL.eXe Token: SeDebugPrivilege 3844 PowERSHElL.eXe Token: SeSystemEnvironmentPrivilege 3844 PowERSHElL.eXe Token: SeRemoteShutdownPrivilege 3844 PowERSHElL.eXe Token: SeUndockPrivilege 3844 PowERSHElL.eXe Token: SeManageVolumePrivilege 3844 PowERSHElL.eXe Token: 33 3844 PowERSHElL.eXe Token: 34 3844 PowERSHElL.eXe Token: 35 3844 PowERSHElL.eXe Token: 36 3844 PowERSHElL.eXe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2192 wrote to memory of 4200 2192 wscript.EXE 99 PID 2192 wrote to memory of 4200 2192 wscript.EXE 99 PID 4200 wrote to memory of 3844 4200 cscript.exe 101 PID 4200 wrote to memory of 3844 4200 cscript.exe 101 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\wscript.exewscript.exe "C:\Users\Admin\AppData\Local\Temp\pa collective agreement pay 28752.js"1⤵PID:4768
-
C:\Windows\system32\wscript.EXEC:\Windows\system32\wscript.EXE POLITI~1.JS1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\System32\cscript.exe"C:\Windows\System32\cscript.exe" "POLITI~1.JS"2⤵
- Suspicious use of WriteProcessMemory
PID:4200 -
C:\Windows\System32\WindowsPowerShell\v1.0\PowERSHElL.eXePowERSHElL.eXe3⤵
- Blocklisted process makes network request
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3844
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
43.0MB
MD5005710598f4661262b8d01ee8380bef0
SHA1035ff16875a9f4c2d27c7b1427058b9c410236af
SHA2567c910a0e3bfb8133854801918aa1a8dde5881b2e80f95b6896f409914fb60c51
SHA5128043ea9ebae4f00c8106981b96d83a0ebb04512e7d01a663d2acbe1a60f5d1136a75f6fd99f6b76228479a35f1b67bb9ff96e0852cc1d54c559c57511ba7bbec