Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
07-05-2024 17:20
Static task
static1
Behavioral task
behavioral1
Sample
Pending - AWB 8020072326.js
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
Pending - AWB 8020072326.js
Resource
win10v2004-20240426-en
General
-
Target
Pending - AWB 8020072326.js
-
Size
25KB
-
MD5
1826cdc5e33da035d66fb04375289ccd
-
SHA1
42cd583dd99548c2a1408b3fc3056ac9247f914d
-
SHA256
ccdd1042d5bb499047575474d90ea911629261381b5992e91cc57e9d07eb0b1e
-
SHA512
a7c72283ca79a1e7f0dddcf72906be40309fb4800c9ba911ef8f7e4921cc0ff25a903a7c5e97337ac27297632284cecc0422d993b191356485e9fec78251d2b6
-
SSDEEP
384:pwL0wdDK1BaBjzWWxcJqoMXvW2aE2uLULwHHYBmRipLw5I5PvHTHXJ1JHSvVDD4k:inKzgePLwn78AI5PjJsVDD4f7dOpO+
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CDtcGSGmCx.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CDtcGSGmCx.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Pending - AWB 8020072326.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Pending - AWB 8020072326.js wscript.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\VD5F31VTCZ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Pending - AWB 8020072326.js\"" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\0IDR124VF6 = "\"C:\\Users\\Admin\\AppData\\Roaming\\CDtcGSGmCx.js\"" wscript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 748 schtasks.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 380 wrote to memory of 464 380 wscript.exe 83 PID 380 wrote to memory of 464 380 wscript.exe 83 PID 380 wrote to memory of 748 380 wscript.exe 85 PID 380 wrote to memory of 748 380 wscript.exe 85 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\wscript.exewscript.exe "C:\Users\Admin\AppData\Local\Temp\Pending - AWB 8020072326.js"1⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:380 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\CDtcGSGmCx.js"2⤵
- Drops startup file
- Adds Run key to start application
PID:464
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Local\Temp\Pending - AWB 8020072326.js2⤵
- Creates scheduled task(s)
PID:748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD587d873a4fd3d66d97e9f2000cb6c3234
SHA119208c058fdde8950a9a73cb7b35cd0fd801c1a7
SHA256d7d8a8e9732d5e1bda8cd07d08d59dc33eff36f0e191d434617793fd81afe5df
SHA5129c26f307c90c8be071bd49c3cc126f9cc23582f25ed015e255c64d5a6eb48888baf7fd95ced915ffbc746faa6a38f0def95dfddc9b05b2f02dd5cc1a2cc77fc8