Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
26-05-2024 05:35
Static task
static1
Behavioral task
behavioral1
Sample
Documento-alteraao-11.03.2020.pdf.js
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
Documento-alteraao-11.03.2020.pdf.js
Resource
win10v2004-20240426-en
General
-
Target
Documento-alteraao-11.03.2020.pdf.js
-
Size
11KB
-
MD5
7f7cce8ee185cce9e86e84a6d0885b57
-
SHA1
93337be9638d0edf6798ae01b13b5482d6b26da3
-
SHA256
95620589e26199d5b927ebeeb777042b9efbd2311aaea1c369bdf78a39a89943
-
SHA512
fa873eb30474d4fc9ebe1ef209c8f5bfed9b91712102806e4d6608f1706815dcf293780d4e09e1e1800a6d5f2de61034d7406bcfc5eeef545daa1010e6d9e9e2
-
SSDEEP
192:zeWaZT3p/+yzT++dMpZ7Wp66zRtuXg25EGV3ehAlL+vrBOYf+wF:6ZTZ/+yzTndMpkg6zR0QCeKUvrlvF
Malware Config
Signatures
-
Blocklisted process makes network request 15 IoCs
Processes:
wscript.exeflow pid process 4 1608 wscript.exe 31 1608 wscript.exe 37 1608 wscript.exe 43 1608 wscript.exe 49 1608 wscript.exe 50 1608 wscript.exe 53 1608 wscript.exe 58 1608 wscript.exe 59 1608 wscript.exe 62 1608 wscript.exe 73 1608 wscript.exe 74 1608 wscript.exe 75 1608 wscript.exe 76 1608 wscript.exe 77 1608 wscript.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
wscript.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 1 IoCs
Processes:
wscript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Documento-alteraao-11.03.2020.pdf.js wscript.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
wscript.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\K5DTIQVEYT = "\"C:\\Users\\Admin\\Documento-altera?ao-11.03.2020.pdf.js\"" wscript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
wscript.exedescription pid process target process PID 1608 wrote to memory of 928 1608 wscript.exe schtasks.exe PID 1608 wrote to memory of 928 1608 wscript.exe schtasks.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\Documento-alteraao-11.03.2020.pdf.js1⤵
- Blocklisted process makes network request
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\Documento-alteraao-11.03.2020.pdf.js2⤵
- Creates scheduled task(s)
PID:928
-