Analysis
-
max time kernel
589s -
max time network
602s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
25/02/2024, 14:13
Static task
static1
Behavioral task
behavioral1
Sample
pa collective agreement pay 2096.js
Resource
win10v2004-20240221-en
General
-
Target
pa collective agreement pay 2096.js
-
Size
1.7MB
-
MD5
130a52a64c66c1e31319d3fad76872ea
-
SHA1
1850fc44c2ecbfcc8830c1915d32feb66dc6cdc6
-
SHA256
43367f43db761b7d1774720cd37ec2dd3b747e00cfa4fd1255543bf1863df6d5
-
SHA512
2d6fc22e7fd5bfab5589ffa1841e4edaff717418e7518809b9fdeb4322f85d21512d9b6da2ba6ab454a763d9d83152daa932280b468b2d6920f6600751d3942e
-
SSDEEP
12288:SeMDXYbhfw4Y/Nz2z+FIE5AlQlDu90TsDJWx5u1xNydLpg8hC6gQl6GfwgqqQkvK:Semobhfj8mWHu1/wD5HroObm
Malware Config
Signatures
-
GootLoader
JavaScript loader known for delivering other families such as Gootkit and Cobaltstrike.
-
Blocklisted process makes network request 20 IoCs
flow pid Process 53 3988 powershell.exe 56 3988 powershell.exe 62 3988 powershell.exe 65 3988 powershell.exe 67 3988 powershell.exe 69 3988 powershell.exe 71 3988 powershell.exe 73 3988 powershell.exe 75 3988 powershell.exe 77 3988 powershell.exe 79 3988 powershell.exe 81 3988 powershell.exe 84 3988 powershell.exe 86 3988 powershell.exe 89 3988 powershell.exe 91 3988 powershell.exe 92 3988 powershell.exe 93 3988 powershell.exe 94 3988 powershell.exe 95 3988 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1414748551-1520717498-2956787782-1000\Control Panel\International\Geo\Nation wscript.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ powershell.exe Key created \REGISTRY\USER\S-1-5-21-1414748551-1520717498-2956787782-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ powershell.exe -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 3988 powershell.exe 3988 powershell.exe 3988 powershell.exe 3988 powershell.exe 3988 powershell.exe 3988 powershell.exe 3988 powershell.exe 3988 powershell.exe 3988 powershell.exe 3988 powershell.exe 3988 powershell.exe 3988 powershell.exe 3988 powershell.exe 3988 powershell.exe 3988 powershell.exe 3988 powershell.exe 3988 powershell.exe 3988 powershell.exe 3988 powershell.exe 3988 powershell.exe 3988 powershell.exe 3988 powershell.exe 3988 powershell.exe 3988 powershell.exe 3988 powershell.exe 3988 powershell.exe 3988 powershell.exe 3988 powershell.exe 3988 powershell.exe 3988 powershell.exe 3988 powershell.exe 3988 powershell.exe 3988 powershell.exe 3988 powershell.exe 3988 powershell.exe 3988 powershell.exe 3988 powershell.exe 3988 powershell.exe 3988 powershell.exe 3988 powershell.exe 3988 powershell.exe 3988 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3988 powershell.exe Token: SeIncreaseQuotaPrivilege 3988 powershell.exe Token: SeSecurityPrivilege 3988 powershell.exe Token: SeTakeOwnershipPrivilege 3988 powershell.exe Token: SeLoadDriverPrivilege 3988 powershell.exe Token: SeSystemProfilePrivilege 3988 powershell.exe Token: SeSystemtimePrivilege 3988 powershell.exe Token: SeProfSingleProcessPrivilege 3988 powershell.exe Token: SeIncBasePriorityPrivilege 3988 powershell.exe Token: SeCreatePagefilePrivilege 3988 powershell.exe Token: SeBackupPrivilege 3988 powershell.exe Token: SeRestorePrivilege 3988 powershell.exe Token: SeShutdownPrivilege 3988 powershell.exe Token: SeDebugPrivilege 3988 powershell.exe Token: SeSystemEnvironmentPrivilege 3988 powershell.exe Token: SeRemoteShutdownPrivilege 3988 powershell.exe Token: SeUndockPrivilege 3988 powershell.exe Token: SeManageVolumePrivilege 3988 powershell.exe Token: 33 3988 powershell.exe Token: 34 3988 powershell.exe Token: 35 3988 powershell.exe Token: 36 3988 powershell.exe Token: SeIncreaseQuotaPrivilege 3988 powershell.exe Token: SeSecurityPrivilege 3988 powershell.exe Token: SeTakeOwnershipPrivilege 3988 powershell.exe Token: SeLoadDriverPrivilege 3988 powershell.exe Token: SeSystemProfilePrivilege 3988 powershell.exe Token: SeSystemtimePrivilege 3988 powershell.exe Token: SeProfSingleProcessPrivilege 3988 powershell.exe Token: SeIncBasePriorityPrivilege 3988 powershell.exe Token: SeCreatePagefilePrivilege 3988 powershell.exe Token: SeBackupPrivilege 3988 powershell.exe Token: SeRestorePrivilege 3988 powershell.exe Token: SeShutdownPrivilege 3988 powershell.exe Token: SeDebugPrivilege 3988 powershell.exe Token: SeSystemEnvironmentPrivilege 3988 powershell.exe Token: SeRemoteShutdownPrivilege 3988 powershell.exe Token: SeUndockPrivilege 3988 powershell.exe Token: SeManageVolumePrivilege 3988 powershell.exe Token: 33 3988 powershell.exe Token: 34 3988 powershell.exe Token: 35 3988 powershell.exe Token: 36 3988 powershell.exe Token: SeIncreaseQuotaPrivilege 3988 powershell.exe Token: SeSecurityPrivilege 3988 powershell.exe Token: SeTakeOwnershipPrivilege 3988 powershell.exe Token: SeLoadDriverPrivilege 3988 powershell.exe Token: SeSystemProfilePrivilege 3988 powershell.exe Token: SeSystemtimePrivilege 3988 powershell.exe Token: SeProfSingleProcessPrivilege 3988 powershell.exe Token: SeIncBasePriorityPrivilege 3988 powershell.exe Token: SeCreatePagefilePrivilege 3988 powershell.exe Token: SeBackupPrivilege 3988 powershell.exe Token: SeRestorePrivilege 3988 powershell.exe Token: SeShutdownPrivilege 3988 powershell.exe Token: SeDebugPrivilege 3988 powershell.exe Token: SeSystemEnvironmentPrivilege 3988 powershell.exe Token: SeRemoteShutdownPrivilege 3988 powershell.exe Token: SeUndockPrivilege 3988 powershell.exe Token: SeManageVolumePrivilege 3988 powershell.exe Token: 33 3988 powershell.exe Token: 34 3988 powershell.exe Token: 35 3988 powershell.exe Token: 36 3988 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2192 wrote to memory of 4324 2192 wscript.EXE 97 PID 2192 wrote to memory of 4324 2192 wscript.EXE 97 PID 4324 wrote to memory of 3988 4324 cscript.exe 99 PID 4324 wrote to memory of 3988 4324 cscript.exe 99 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\wscript.exewscript.exe "C:\Users\Admin\AppData\Local\Temp\pa collective agreement pay 2096.js"1⤵PID:1724
-
C:\Windows\system32\wscript.EXEC:\Windows\system32\wscript.EXE TELEVI~1.JS1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\System32\cscript.exe"C:\Windows\System32\cscript.exe" "TELEVI~1.JS"2⤵
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell3⤵
- Blocklisted process makes network request
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3988
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
311KB
MD54a1641dbbc2fdbd4f076b3b17d176394
SHA1a336466a00b51f9ad045be9b48507752d30a6686
SHA256b66b874e4fefbf7d5b8760e7716ae5f98a612cc8211670dab4af2f72fd74b446
SHA512837e324d809abca79acf0d5e769d4232ca622a6f65c177dae4a0fa4d3f26f058f56fe05f274bd7d53ab48b538598ea86470e52a03d3bf89e91de7281a3765a85