Analysis

  • max time kernel
    93s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-05-2024 13:43

General

  • Target

    результат_проверки_xls.js

  • Size

    17KB

  • MD5

    0c2e83eb8395dd33cef93e5dcaf01239

  • SHA1

    68d0c34fad1f228e64002e628d12c1261de3dc21

  • SHA256

    0bc7575a00fce267765739ecc341a2854111a24d6fbc1e09a2295eb8d886ab0a

  • SHA512

    3506eef56a1027db49be39ad739817a30e41866cd2a126038d1bda7e1587499e8c6d3dff7f3ffcb9614d7b3cf314c2ce42e1d9ff357b15a133f074f1d1bad2e1

  • SSDEEP

    384:+lG3mrmR2e1FzdVk583vUYHXHpV/nsDI9B7+bPAxBUbkRU6UhxWa482:+lG3mSR2e1FzdVky3vfHPnsXAMwazJb2

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\результат_проверки_xls.js
    1⤵
    • Blocklisted process makes network request
    • Checks computer location settings
    • Deletes itself
    • Suspicious use of WriteProcessMemory
    PID:4288
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\rad94571.tmp
      2⤵
      • Modifies registry class
      PID:1188
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:2956

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rad94571.tmp

    Filesize

    16KB

    MD5

    cea453a99809053ad3cd5029039856be

    SHA1

    2c139e08f997f7e0eeb59dbe564b10ad396cfde8

    SHA256

    1c30a8bd11030c52b005a7f690e7a6b3b5b9ebbd6669959e2ead26c94bed8fae

    SHA512

    38ef575da59425dd5249ba08b5ef81f003949259e314e9b24cc46a0431d04d259d32fd41b8a75ada592abbad95f6aa2506011508b3bd1ef3e7b1115045d947d6