Analysis
-
max time kernel
150s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
28-01-2024 23:59
Static task
static1
Behavioral task
behavioral1
Sample
7e58440b8eb773b24aace538de1c5437.js
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7e58440b8eb773b24aace538de1c5437.js
Resource
win10v2004-20231215-en
General
-
Target
7e58440b8eb773b24aace538de1c5437.js
-
Size
67KB
-
MD5
7e58440b8eb773b24aace538de1c5437
-
SHA1
b824cf54e9e9e1c28ff2ec6b6e3de9048750f5cb
-
SHA256
21e0026aeb23c03125337151d862a29372ac17af5663fca1f5ff7beeacf82fc1
-
SHA512
a3d50e13255253989be68a25304ad51098fdbbe8873269d6fd148cc7ef641639bea881cfb57837182ee0c5036340cdd572706d0ac5552c6be8404404f79db298
-
SSDEEP
1536:YQ/nup5Ih191nup5Ih19efc//nup5Ih191nup5Ih19efcq6:7Gf9fbfWGf9fbfE
Malware Config
Signatures
-
Blocklisted process makes network request 12 IoCs
flow pid Process 20 4064 wscript.exe 23 4064 wscript.exe 34 4064 wscript.exe 36 4064 wscript.exe 49 4064 wscript.exe 53 4064 wscript.exe 55 4064 wscript.exe 58 4064 wscript.exe 60 4064 wscript.exe 62 4064 wscript.exe 65 4064 wscript.exe 67 4064 wscript.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 4 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\rVRpsUBiCR.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7e58440b8eb773b24aace538de1c5437.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7e58440b8eb773b24aace538de1c5437.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\rVRpsUBiCR.js wscript.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\0HKX5ALWLG = "\"C:\\Users\\Admin\\AppData\\Roaming\\rVRpsUBiCR.js\"" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4064 wrote to memory of 2012 4064 wscript.exe 85 PID 4064 wrote to memory of 2012 4064 wscript.exe 85
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\7e58440b8eb773b24aace538de1c5437.js1⤵
- Blocklisted process makes network request
- Checks computer location settings
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\rVRpsUBiCR.js"2⤵
- Drops startup file
- Adds Run key to start application
PID:2012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD5ed533885cb7d43829db0e85dbaabec22
SHA1c19225ec3612ce86d4f5b8046ae65b3332d40776
SHA2566641f0211253402fa4b39005e29c7e0b688d3722d05746040f6c35b4c14182eb
SHA512b6420e3c79ebb31b687f1b3f89ee4a67ea45bc08628aa91cf9ad63cd6c488f198ef6f981ad784cfa6ce3534d937a4a957e02e00d2b09c99301cfba1e90d1996b