Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26-02-2024 21:57
Static task
static1
Behavioral task
behavioral1
Sample
a51cc3c60ccd7b5ea425e70d4a6d3b66174f6e0b71304e9cc34bd800e54d6bc4.js
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a51cc3c60ccd7b5ea425e70d4a6d3b66174f6e0b71304e9cc34bd800e54d6bc4.js
Resource
win10v2004-20240226-en
General
-
Target
a51cc3c60ccd7b5ea425e70d4a6d3b66174f6e0b71304e9cc34bd800e54d6bc4.js
-
Size
16KB
-
MD5
836365de25b8b33c14a7971eeca6151b
-
SHA1
2d781e6634f16e12952318b84185f73637724c9c
-
SHA256
a51cc3c60ccd7b5ea425e70d4a6d3b66174f6e0b71304e9cc34bd800e54d6bc4
-
SHA512
9b30560d74689238c15c0b7c35fc2cd8d007352445be8fda6c84be1ed602303a9285212a830df5e79131ee19d2ef738be3a942bd58147249be51572e22031f85
-
SSDEEP
384:wLvHm13dN8b4H28naIpRkIfyqcmNxey3hzi8zzHLRsdqjyNLxFcXtqFZaZ:wi1tNXT7PWchmYxsdqjyNNFc0FZaZ
Malware Config
Signatures
-
Blocklisted process makes network request 15 IoCs
flow pid Process 6 4292 wscript.exe 26 4292 wscript.exe 27 4292 wscript.exe 30 4292 wscript.exe 34 4292 wscript.exe 37 4292 wscript.exe 41 4292 wscript.exe 43 4292 wscript.exe 44 4292 wscript.exe 48 4292 wscript.exe 49 4292 wscript.exe 50 4292 wscript.exe 51 4292 wscript.exe 52 4292 wscript.exe 53 4292 wscript.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a51cc3c60ccd7b5ea425e70d4a6d3b66174f6e0b71304e9cc34bd800e54d6bc4.js wscript.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\P7EKOWB6GH = "\"C:\\ProgramData\\a51cc3c60ccd7b5ea425e70d4a6d3b66174f6e0b71304e9cc34bd800e54d6bc4.js\"" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4256 schtasks.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4292 wrote to memory of 4256 4292 wscript.exe 86 PID 4292 wrote to memory of 4256 4292 wscript.exe 86 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\a51cc3c60ccd7b5ea425e70d4a6d3b66174f6e0b71304e9cc34bd800e54d6bc4.js1⤵
- Blocklisted process makes network request
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\ProgramData\a51cc3c60ccd7b5ea425e70d4a6d3b66174f6e0b71304e9cc34bd800e54d6bc4.js2⤵
- Creates scheduled task(s)
PID:4256
-