Analysis
-
max time kernel
156s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29-02-2024 21:33
Static task
static1
Behavioral task
behavioral1
Sample
af85d8109ff251f1db6191b46ef8c66f.js
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
af85d8109ff251f1db6191b46ef8c66f.js
Resource
win10v2004-20240226-en
General
-
Target
af85d8109ff251f1db6191b46ef8c66f.js
-
Size
191KB
-
MD5
af85d8109ff251f1db6191b46ef8c66f
-
SHA1
b1f6c58407bd70c4819db5eecfbc2cdcb5af77e3
-
SHA256
5ec545f3cccb7dddd12196320fb5144f131818170d87000cdca10fe9fb0353d4
-
SHA512
1a7bf9da69cd189c15d33c0a7114670c0a0c5b76cf6f8cece60c33cac7b32cb7d22d13a989d19f61eebead584429d3ed9afdd8a222959b24ee31abc62353d48d
-
SSDEEP
3072:yWt8ruabx2MftvMQDvolUJSKqvCVfKzJme6TB+ZhUzzv9EZAUycwqeHZzL:yWt8ruEjMV3KqsaB+B+MzFpeSzL
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\tKaUarDZDG.js WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\tKaUarDZDG.js WScript.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 3600 icacls.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\B02N3ZE1UL = "\"C:\\Users\\Admin\\AppData\\Roaming\\tKaUarDZDG.js\"" WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000_Classes\Local Settings wscript.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4524 wrote to memory of 4752 4524 wscript.exe 86 PID 4524 wrote to memory of 4752 4524 wscript.exe 86 PID 4524 wrote to memory of 2072 4524 wscript.exe 87 PID 4524 wrote to memory of 2072 4524 wscript.exe 87 PID 2072 wrote to memory of 3600 2072 javaw.exe 90 PID 2072 wrote to memory of 3600 2072 javaw.exe 90 PID 2072 wrote to memory of 1288 2072 javaw.exe 95 PID 2072 wrote to memory of 1288 2072 javaw.exe 95
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\af85d8109ff251f1db6191b46ef8c66f.js1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\tKaUarDZDG.js"2⤵
- Drops startup file
- Adds Run key to start application
PID:4752
-
-
C:\Program Files\Java\jre-1.8\bin\javaw.exe"C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\ajbycxarzb.txt"2⤵
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M3⤵
- Modifies file permissions
PID:3600
-
-
C:\Program Files\Java\jre-1.8\bin\java.exe"C:\Program Files\Java\jre-1.8\bin\java.exe" -jar "C:\Users\Admin\ajbycxarzb.txt"3⤵PID:1288
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD5867850ddb78213b53afb8e96709a2354
SHA12a182d7acb05fe867558a35db5b451875bee46dc
SHA2566252fc628c265e5941b54400ae23fbd8d4121f1f177ba23f684c8f4bc105d57e
SHA51297b64d37764851646b34b4e4f397faef6cc097e6e025be62fc416f13834dc8b86827239b370f31635ed454793c4d04515874886bef64af64c6ed403c3da3d8e9
-
Filesize
92KB
MD5e960b9b8954afa303d7989eed1290637
SHA1a42410c56fb024243014c29334152c209ab88873
SHA2564439ce946a74288bc91360bee4b7ef43e7efeced81432ba10728220c323d7c7f
SHA512cdb3f0e2911f1841919847903c6f6bd695e3f15106c1a5b7fa19b70e549967beefa7c32c87a1a2040bbc2b7a75b1a90adc7a7e113f519e15b09f62dc0ea473c8
-
Filesize
5KB
MD51f7a1f50ddcaacd7c16098f452ae3ea9
SHA1c31e3feb895e9b69db5e014cc42a2b3e03473016
SHA256f14d01dc44ad040b5c3a8b418aa4c27bc476f0c5bd7af5e1554547fe0f6bb2ef
SHA5126835fe9faac663378a6bd96e4dcba1f492d4dc488d410e019a965ca3c989c0d66d39f71b213a579c0e55fa4e52deb542b64c9b68108763af6ffed89414867271