Analysis

  • max time kernel
    142s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/06/2024, 11:39

General

  • Target

    Rechnungs_Details_2728242565DE_Mai_10_2019.js

  • Size

    4KB

  • MD5

    8f4c4b1aeab1b8a5cea66beef22a8da3

  • SHA1

    8fb18d29bedbcfa680dcf6cfe9e197adf64e474c

  • SHA256

    9cc55391cab46feb884731f30349d70a8db8db242a5eebdd45fcbbc3f00bf404

  • SHA512

    ab83142c6b918890c80fecbbcd2304b8c49c4ad95eaa15589d6d01e823558de9e765e723bdee33d7e7908512040297592f549e6be76ab1fb46c79882a7e8d70c

  • SSDEEP

    48:FFpkFSuOGEyMAEti7h2hPEfEDtXZpzKHFIqgAiRZnTLAs6ueL/k/kVB3EiVPmv0r:FfjpOh2GfExqg/gjscpPmNa

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 3 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\Rechnungs_Details_2728242565DE_Mai_10_2019.js
    1⤵
    • Blocklisted process makes network request
    • Checks computer location settings
    PID:4296
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4064 --field-trial-handle=2744,i,16362475727591565961,3676688664819797550,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:5060

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\9ycuwraqs.exe

            Filesize

            273B

            MD5

            f65992c6f3241459bba9cf133c626735

            SHA1

            3c6d8521481edad0d798ac993d704397d6c1ab5b

            SHA256

            25f5545345cd5cbc8e829f670ce05997d76abf445455a7dd8dd40fe182edc3b2

            SHA512

            5b4f55c61645340c8e3df40cadb94b91e0ccf599de38dca97bc348f1ce9138066daa2494e4a6cac7fa55f9eeb6a67d10d1a54a15a15700c8a88c1f6d5a395e6c