Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-01-2024 03:26
Static task
static1
Behavioral task
behavioral1
Sample
83515551eaa1178801cc99a303160826.js
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
83515551eaa1178801cc99a303160826.js
Resource
win10v2004-20231215-en
General
-
Target
83515551eaa1178801cc99a303160826.js
-
Size
199KB
-
MD5
83515551eaa1178801cc99a303160826
-
SHA1
4adb1263847292b0fe47225a2ad2e6143f73dbaf
-
SHA256
744c760018483ee148b61b496f3fce2d3bc7de7aebb72269f914baaf73f34633
-
SHA512
0dce6c4e259995f7754933f28e4cfcd0dacd65df9d0c73dd21fdbe7bf0f4ec19036287e09088034f86dcfe9f61f44a0c2b010cf4d36275876707c389e4b6b8fe
-
SSDEEP
3072:lritC+1MYgCc1doOgng49ooBP/GmhWi5eTIQ+vZzMd3efZeb9sHts649mPnhXY:4ggnTWq/TH1AsW6KslY
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\QUKoVKgJQp.js WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\QUKoVKgJQp.js WScript.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 4864 icacls.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SEJOKAOI5S = "\"C:\\Users\\Admin\\AppData\\Roaming\\QUKoVKgJQp.js\"" WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings wscript.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1720 wrote to memory of 2196 1720 wscript.exe 84 PID 1720 wrote to memory of 2196 1720 wscript.exe 84 PID 1720 wrote to memory of 1708 1720 wscript.exe 85 PID 1720 wrote to memory of 1708 1720 wscript.exe 85 PID 1708 wrote to memory of 4864 1708 javaw.exe 87 PID 1708 wrote to memory of 4864 1708 javaw.exe 87
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\83515551eaa1178801cc99a303160826.js1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\QUKoVKgJQp.js"2⤵
- Drops startup file
- Adds Run key to start application
PID:2196
-
-
C:\Program Files\Java\jre-1.8\bin\javaw.exe"C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\pdfooablue.txt"2⤵
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M3⤵
- Modifies file permissions
PID:4864
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD500e359c2e17c7c129e3b2920f9657f83
SHA1c2fe4ece42475deaf81473e9109205af5c56dfc4
SHA256ee58513f912d890e5e24f6f986cffc71c4240c7df406642efb1c63b1df25760f
SHA5129eb36517b604681920d9ed5b799060b1b469d8cba614396da7e8e9a7d1430b24e5c9ae9cd05b701c415068d31781c697d396e5c6cac488f155b5a9ecff2651f1
-
Filesize
10KB
MD520db8f29d1db93e67b8b2ad6196d9e37
SHA1ce499527cae2ea611057d5dc952132b0d948eba4
SHA256349e780cca53f741459e1da002e177b536bf4eb7c69f5d3efaa6c4287bcfa985
SHA51271950c00ace082834e8b13ccc869a5d13c1ee0fe83e170ea3714b0a4279bad2d560f2dd6c2f200bddd4a00b241ff6553db9f6c8156cda7b60f0c08629512bfd3
-
Filesize
89KB
MD57873269dd388d4ff3dbe9f020e121e89
SHA1d50b0740bab0ebc4cf6b3cc4c586632f6dc9e13e
SHA256bc12cbf509a1f5bff1dea9896aae44b9bc119115bf38349f6caabbbf99e0e919
SHA51236fdd31209b3448dc32100f733c048b063521bade50a5dd8a3945b7acc5b504115036a6c37bf37ac99b31cf4f94a63b7040224bcf5d8b0c3d2bc93e4bb0fc818