Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26-02-2024 21:54
Static task
static1
Behavioral task
behavioral1
Sample
a48662837e2ec326182f3c966128023993f0ddb16d70ca0b457190f9239aafd6.js
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
a48662837e2ec326182f3c966128023993f0ddb16d70ca0b457190f9239aafd6.js
Resource
win10v2004-20240226-en
General
-
Target
a48662837e2ec326182f3c966128023993f0ddb16d70ca0b457190f9239aafd6.js
-
Size
20KB
-
MD5
7cca426f80eb9e873deda56270e3a87d
-
SHA1
3d453d3444f0fd8b9b36690846d53afe6e46e3ce
-
SHA256
a48662837e2ec326182f3c966128023993f0ddb16d70ca0b457190f9239aafd6
-
SHA512
240aee7b4bf29c4668c6f8676378d4e278453a5941f082c1b343c4e8353c71961974b1dd51693efbff48d2d9ab330e890c6530592354f755d9b7338b979c18ed
-
SSDEEP
384:3SK4zDaYUwp4CgPOglA+SXPLzkcauhZvQVcJeaDhDK:i/fGmgl+zzkcautwaDhu
Malware Config
Signatures
-
Blocklisted process makes network request 6 IoCs
flow pid Process 24 3884 wscript.exe 32 3884 wscript.exe 42 3884 wscript.exe 54 3884 wscript.exe 60 3884 wscript.exe 70 3884 wscript.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ItfSPdhJKB.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ItfSPdhJKB.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a48662837e2ec326182f3c966128023993f0ddb16d70ca0b457190f9239aafd6.js wscript.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SEJOKAOI5S = "\"C:\\Users\\Admin\\AppData\\Roaming\\ItfSPdhJKB.js\"" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RV7KJCEOJC = "\"C:\\Users\\Admin\\AppData\\Roaming\\a48662837e2ec326182f3c966128023993f0ddb16d70ca0b457190f9239aafd6.js\"" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4400 schtasks.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3884 wrote to memory of 688 3884 wscript.exe 93 PID 3884 wrote to memory of 688 3884 wscript.exe 93 PID 3884 wrote to memory of 4400 3884 wscript.exe 96 PID 3884 wrote to memory of 4400 3884 wscript.exe 96 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\a48662837e2ec326182f3c966128023993f0ddb16d70ca0b457190f9239aafd6.js1⤵
- Blocklisted process makes network request
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3884 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\ItfSPdhJKB.js"2⤵
- Drops startup file
- Adds Run key to start application
PID:688
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\a48662837e2ec326182f3c966128023993f0ddb16d70ca0b457190f9239aafd6.js2⤵
- Creates scheduled task(s)
PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4140 --field-trial-handle=2692,i,8678872182442199182,12502579059484928042,262144 --variations-seed-version /prefetch:81⤵PID:4136
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD50851f9bfb7bdea6addc8e4fcaa6a61aa
SHA1039314465e36535a70401b02f1440c3ae7280aeb
SHA2560ddbfca6f4f211321799ea6b750f5a4282e911716b497ac4c24ecb88f89af501
SHA512ad0eb6d2fb7f988f8c280fe873659f456d6a40180bc6fb781bc9742836db89f4783d31544d2e471b0ceaea11970af813c117b14480afa4f855de6418e1c93fe2