Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08/03/2024, 09:07
Static task
static1
Behavioral task
behavioral1
Sample
1859443221203720008.js
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1859443221203720008.js
Resource
win10v2004-20240226-en
General
-
Target
1859443221203720008.js
-
Size
1.3MB
-
MD5
fa9fe937a01a4d7b1aa82033b11ba0ad
-
SHA1
b32f3ad5b40e42ac7194987afd21fbf7188afb21
-
SHA256
3e68fa9ec9de4345e1d2d9937acd1bbf4695a035fe950640a558490bbf8a2ad6
-
SHA512
e98c4d25024bcddc33c128b8d7fc352f49b165118d416614e4c9bd094cf01766e4176052df8b6830ab866f73c61e197780a8a3e45584740a1a38814a03a340ac
-
SSDEEP
24576:nkYkWHsvb/dmmrH3yUmXHjJ7Pfv4lhZ9UzZ1Xs:CdVXqjFGVCZ1Xs
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation wscript.exe -
Executes dropped EXE 1 IoCs
pid Process 2928 fitfilthy.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4192 wrote to memory of 2188 4192 wscript.exe 89 PID 4192 wrote to memory of 2188 4192 wscript.exe 89 PID 2188 wrote to memory of 3112 2188 cmd.exe 94 PID 2188 wrote to memory of 3112 2188 cmd.exe 94 PID 2188 wrote to memory of 2148 2188 cmd.exe 95 PID 2188 wrote to memory of 2148 2188 cmd.exe 95 PID 2188 wrote to memory of 324 2188 cmd.exe 96 PID 2188 wrote to memory of 324 2188 cmd.exe 96 PID 324 wrote to memory of 2928 324 cmd.exe 97 PID 324 wrote to memory of 2928 324 cmd.exe 97
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\1859443221203720008.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k copy "C:\Users\Admin\AppData\Local\Temp\1859443221203720008.js" "C:\Users\Admin\\discreetarm.bat" && "C:\Users\Admin\\discreetarm.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\system32\findstr.exefindstr /V sillygeneral ""C:\Users\Admin\\discreetarm.bat""3⤵PID:3112
-
-
C:\Windows\system32\certutil.execertutil -f -decode brokenexpert fitfilthy.exe3⤵PID:2148
-
-
C:\Windows\system32\cmd.execmd /C fitfilthy.exe3⤵
- Suspicious use of WriteProcessMemory
PID:324 -
C:\Users\Admin\fitfilthy.exefitfilthy.exe4⤵
- Executes dropped EXE
PID:2928
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD53272048bb173814eee926ddfac2a1039
SHA1d5d363c564c50c2c427e12dea54352a2f561f536
SHA256c559589990050a5ef29eb754cda4f6425a5a0695dbbada076873ed7f7efe9dc2
SHA512db13595ac96cc4e61eda7fe511f4afd47c4065cd8b764569b65e57f3ac4a10f36cb7a7520c1b8f9a23f71aa8458c49c1e4f2d589c08e7699319c3d5de7e2734e
-
Filesize
1.3MB
MD5fa9fe937a01a4d7b1aa82033b11ba0ad
SHA1b32f3ad5b40e42ac7194987afd21fbf7188afb21
SHA2563e68fa9ec9de4345e1d2d9937acd1bbf4695a035fe950640a558490bbf8a2ad6
SHA512e98c4d25024bcddc33c128b8d7fc352f49b165118d416614e4c9bd094cf01766e4176052df8b6830ab866f73c61e197780a8a3e45584740a1a38814a03a340ac
-
Filesize
902KB
MD5e9e8524f7bcd6868f4d70608c1d24a47
SHA1bca63ab961bde4eed964fb0487039746b03d855c
SHA256daaee94c612d856c11114d80ef9c3fae259548b3977797269b0dd01c22a9d2c3
SHA5129037f267e1e095869a456247e65e91bf80aadd79129e470a35c97427a9ad5200e008d89eeefb263db54bf3d7a2d03265045ca1222648e6ab675f7c85603aff0e