Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/03/2024, 14:53

General

  • Target

    legal number of consecutive work days 43631.js

  • Size

    22.5MB

  • MD5

    2ed843b73f6c955944b79b6f1bda1718

  • SHA1

    99c094ea7c2583050e807c71e8850243cd7f1132

  • SHA256

    76e41bfaf09fd017709ff42b930de5605d7552439dd8427321bfd3b5a0770fbb

  • SHA512

    2e095d8f5d656a8f3e7d4e8c745b07a6d5a242b93d5a5cf61c2c7f301e7679543a600b8a7b7a4a689204229e619ec683c489725a84339761ff7aa7c1749f8075

  • SSDEEP

    49152:N7BSzjCxbRqHlp4NIuN0EchwxhC8ztYzYBIVa+8Zis3xD/GCqGpYn3qu9Q6g6cE9:C

Score
10/10

Malware Config

Signatures

  • GootLoader

    JavaScript loader known for delivering other families such as Gootkit and Cobaltstrike.

  • Blocklisted process makes network request 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe "C:\Users\Admin\AppData\Local\Temp\legal number of consecutive work days 43631.js"
    1⤵
      PID:1860
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3980 --field-trial-handle=3084,i,14217130992253490921,11543335378077656547,262144 --variations-seed-version /prefetch:8
      1⤵
        PID:4452
      • C:\Windows\system32\wscript.EXE
        C:\Windows\system32\wscript.EXE REALES~1.JS
        1⤵
        • Checks computer location settings
        • Suspicious use of WriteProcessMemory
        PID:2064
        • C:\Windows\System32\cscript.exe
          "C:\Windows\System32\cscript.exe" "REALES~1.JS"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:2008
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell
            3⤵
            • Blocklisted process makes network request
            • Modifies registry class
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4884

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_2q2s3i4m.fot.ps1

              Filesize

              60B

              MD5

              d17fe0a3f47be24a6453e9ef58c94641

              SHA1

              6ab83620379fc69f80c0242105ddffd7d98d5d9d

              SHA256

              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

              SHA512

              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

            • C:\Users\Admin\AppData\Roaming\Mozilla\REALES~1.JS

              Filesize

              24.1MB

              MD5

              eba56bba396c654934aa267a84dc8b08

              SHA1

              ff18fd7830559467c5984a134baecd352e71cb8c

              SHA256

              a9549484794761f196ea726b2f477fcc28fefa33c42b6a28e76981b1c3d1196c

              SHA512

              39b9b87f3c60f29a0a1d73802845d125e488408cf1c1d8c5541ff693079a54d27e55021d2345a8c2b94d28407e0093b8392ca1cae3ded4a3164bde4bc8323a8f

            • memory/4884-18-0x0000021728160000-0x0000021728170000-memory.dmp

              Filesize

              64KB

            • memory/4884-20-0x0000021728A10000-0x0000021728A34000-memory.dmp

              Filesize

              144KB

            • memory/4884-6-0x0000021728160000-0x0000021728170000-memory.dmp

              Filesize

              64KB

            • memory/4884-4-0x00007FFBB5EE0000-0x00007FFBB69A1000-memory.dmp

              Filesize

              10.8MB

            • memory/4884-16-0x0000021728680000-0x00000217286C4000-memory.dmp

              Filesize

              272KB

            • memory/4884-17-0x0000021728840000-0x00000217288B6000-memory.dmp

              Filesize

              472KB

            • memory/4884-3-0x0000021728810000-0x0000021728832000-memory.dmp

              Filesize

              136KB

            • memory/4884-5-0x0000021728160000-0x0000021728170000-memory.dmp

              Filesize

              64KB

            • memory/4884-19-0x0000021728A10000-0x0000021728A3A000-memory.dmp

              Filesize

              168KB

            • memory/4884-21-0x0000021728160000-0x0000021728170000-memory.dmp

              Filesize

              64KB

            • memory/4884-23-0x00007FFBB5EE0000-0x00007FFBB69A1000-memory.dmp

              Filesize

              10.8MB

            • memory/4884-24-0x0000021728160000-0x0000021728170000-memory.dmp

              Filesize

              64KB

            • memory/4884-25-0x0000021728160000-0x0000021728170000-memory.dmp

              Filesize

              64KB

            • memory/4884-26-0x0000021728160000-0x0000021728170000-memory.dmp

              Filesize

              64KB

            • memory/4884-27-0x0000021728160000-0x0000021728170000-memory.dmp

              Filesize

              64KB

            • memory/4884-28-0x0000021728160000-0x0000021728170000-memory.dmp

              Filesize

              64KB