Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
23-04-2024 05:02
Static task
static1
Behavioral task
behavioral1
Sample
Remittance slip.js
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Remittance slip.js
Resource
win10v2004-20240412-en
General
-
Target
Remittance slip.js
-
Size
23KB
-
MD5
b43b26e225000fb00800a9146e0e8fd8
-
SHA1
bee1172d3b121eb67cac1fb1f3ce37d7efa10d55
-
SHA256
203cd83c288970b9caabec63d2bc421abcd42ef62658b5f47b72997d9033565f
-
SHA512
82b253ff647b91d9ee3ffcbf5f3c3e14ceafbb04dc53479d8f2a40c420734efb93c6067a8705489936fefd3a6462ebd45be5b47416aa1782950f8043574b0a65
-
SSDEEP
384:TR50lxft160hWVE6pqRXkRwhuzieIgJkCnkvqiFmCaVCmmaJ7dyXQntXCfmM56:TRSxV1MEhRXkR7ieIChnkiBljmaJ78XC
Malware Config
Signatures
-
Blocklisted process makes network request 15 IoCs
Processes:
wscript.exeflow pid process 33 3004 wscript.exe 40 3004 wscript.exe 49 3004 wscript.exe 53 3004 wscript.exe 64 3004 wscript.exe 65 3004 wscript.exe 66 3004 wscript.exe 79 3004 wscript.exe 81 3004 wscript.exe 82 3004 wscript.exe 86 3004 wscript.exe 98 3004 wscript.exe 99 3004 wscript.exe 100 3004 wscript.exe 101 3004 wscript.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
wscript.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 2 IoCs
Processes:
wscript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Remittance slip.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Remittance slip.js wscript.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
wscript.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\5TJJF2Z3XN = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Remittance slip.js\"" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
wscript.exedescription pid process target process PID 3004 wrote to memory of 4340 3004 wscript.exe schtasks.exe PID 3004 wrote to memory of 4340 3004 wscript.exe schtasks.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\wscript.exewscript.exe "C:\Users\Admin\AppData\Local\Temp\Remittance slip.js"1⤵
- Blocklisted process makes network request
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Local\Temp\Remittance slip.js2⤵
- Creates scheduled task(s)
PID:4340
-