Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
04-06-2024 01:44
Static task
static1
Behavioral task
behavioral1
Sample
a47fb3147b531316317dd8150333f7417f6fe196f0ef8656babb070e37d9cc0d.js
Resource
win7-20240508-en
General
-
Target
a47fb3147b531316317dd8150333f7417f6fe196f0ef8656babb070e37d9cc0d.js
-
Size
8KB
-
MD5
8bc951c9580b40a1b7c6222613b97da4
-
SHA1
ffeed34cea7de42eb7b1262113ef3c753ae121c0
-
SHA256
a47fb3147b531316317dd8150333f7417f6fe196f0ef8656babb070e37d9cc0d
-
SHA512
5b07d8c2ed5c1a6ea604dfac05a598756e5fa2dfe3db5d3e4219e3752bad176a1b5b8f1f29c7b44513e0939e16ee4d8388c31e6fd232e262a28fbfbf04023bc8
-
SSDEEP
48:1PueRvRbecveUMW9gdueHhUfJawYYueihb+EKpOFwSmvkuess9vGbFKpbbyh:Zz5FMYoBnmaLKpD+mZ
Malware Config
Signatures
-
Async RAT payload 29 IoCs
Processes:
resource yara_rule behavioral1/memory/2500-36-0x0000000000930000-0x0000000000956000-memory.dmp family_asyncrat behavioral1/memory/2500-40-0x0000000000930000-0x0000000000950000-memory.dmp family_asyncrat behavioral1/memory/2500-93-0x0000000000930000-0x0000000000950000-memory.dmp family_asyncrat behavioral1/memory/2500-91-0x0000000000930000-0x0000000000950000-memory.dmp family_asyncrat behavioral1/memory/2500-89-0x0000000000930000-0x0000000000950000-memory.dmp family_asyncrat behavioral1/memory/2500-87-0x0000000000930000-0x0000000000950000-memory.dmp family_asyncrat behavioral1/memory/2500-85-0x0000000000930000-0x0000000000950000-memory.dmp family_asyncrat behavioral1/memory/2500-83-0x0000000000930000-0x0000000000950000-memory.dmp family_asyncrat behavioral1/memory/2500-81-0x0000000000930000-0x0000000000950000-memory.dmp family_asyncrat behavioral1/memory/2500-79-0x0000000000930000-0x0000000000950000-memory.dmp family_asyncrat behavioral1/memory/2500-77-0x0000000000930000-0x0000000000950000-memory.dmp family_asyncrat behavioral1/memory/2500-75-0x0000000000930000-0x0000000000950000-memory.dmp family_asyncrat behavioral1/memory/2500-73-0x0000000000930000-0x0000000000950000-memory.dmp family_asyncrat behavioral1/memory/2500-71-0x0000000000930000-0x0000000000950000-memory.dmp family_asyncrat behavioral1/memory/2500-69-0x0000000000930000-0x0000000000950000-memory.dmp family_asyncrat behavioral1/memory/2500-67-0x0000000000930000-0x0000000000950000-memory.dmp family_asyncrat behavioral1/memory/2500-65-0x0000000000930000-0x0000000000950000-memory.dmp family_asyncrat behavioral1/memory/2500-63-0x0000000000930000-0x0000000000950000-memory.dmp family_asyncrat behavioral1/memory/2500-61-0x0000000000930000-0x0000000000950000-memory.dmp family_asyncrat behavioral1/memory/2500-59-0x0000000000930000-0x0000000000950000-memory.dmp family_asyncrat behavioral1/memory/2500-57-0x0000000000930000-0x0000000000950000-memory.dmp family_asyncrat behavioral1/memory/2500-55-0x0000000000930000-0x0000000000950000-memory.dmp family_asyncrat behavioral1/memory/2500-53-0x0000000000930000-0x0000000000950000-memory.dmp family_asyncrat behavioral1/memory/2500-51-0x0000000000930000-0x0000000000950000-memory.dmp family_asyncrat behavioral1/memory/2500-49-0x0000000000930000-0x0000000000950000-memory.dmp family_asyncrat behavioral1/memory/2500-47-0x0000000000930000-0x0000000000950000-memory.dmp family_asyncrat behavioral1/memory/2500-45-0x0000000000930000-0x0000000000950000-memory.dmp family_asyncrat behavioral1/memory/2500-43-0x0000000000930000-0x0000000000950000-memory.dmp family_asyncrat behavioral1/memory/2500-41-0x0000000000930000-0x0000000000950000-memory.dmp family_asyncrat -
Detects executables packed with ConfuserEx Mod 3 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\SGUDBQ.exe INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/2720-20-0x00000000012B0000-0x0000000001366000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/1632-368-0x0000000000C40000-0x0000000000CF6000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx -
Blocklisted process makes network request 2 IoCs
Processes:
wscript.exeflow pid process 4 1656 wscript.exe 7 1656 wscript.exe -
Downloads MZ/PE file
-
Executes dropped EXE 4 IoCs
Processes:
SGUDBQ.exeSGUDBQ.exeaudio.exeaudio.exepid process 2720 SGUDBQ.exe 2500 SGUDBQ.exe 1632 audio.exe 1656 audio.exe -
Loads dropped DLL 3 IoCs
Processes:
SGUDBQ.execmd.exeaudio.exepid process 2720 SGUDBQ.exe 2584 cmd.exe 1632 audio.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
SGUDBQ.exeaudio.exedescription pid process target process PID 2720 set thread context of 2500 2720 SGUDBQ.exe SGUDBQ.exe PID 1632 set thread context of 1656 1632 audio.exe audio.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1444 timeout.exe -
Processes:
wscript.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 wscript.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 wscript.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
SGUDBQ.exepid process 2500 SGUDBQ.exe 2500 SGUDBQ.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
SGUDBQ.exeaudio.exedescription pid process Token: SeDebugPrivilege 2500 SGUDBQ.exe Token: SeDebugPrivilege 1656 audio.exe -
Suspicious use of WriteProcessMemory 44 IoCs
Processes:
wscript.exeSGUDBQ.exeSGUDBQ.execmd.execmd.exeaudio.exedescription pid process target process PID 1656 wrote to memory of 2720 1656 wscript.exe SGUDBQ.exe PID 1656 wrote to memory of 2720 1656 wscript.exe SGUDBQ.exe PID 1656 wrote to memory of 2720 1656 wscript.exe SGUDBQ.exe PID 1656 wrote to memory of 2720 1656 wscript.exe SGUDBQ.exe PID 2720 wrote to memory of 2500 2720 SGUDBQ.exe SGUDBQ.exe PID 2720 wrote to memory of 2500 2720 SGUDBQ.exe SGUDBQ.exe PID 2720 wrote to memory of 2500 2720 SGUDBQ.exe SGUDBQ.exe PID 2720 wrote to memory of 2500 2720 SGUDBQ.exe SGUDBQ.exe PID 2720 wrote to memory of 2500 2720 SGUDBQ.exe SGUDBQ.exe PID 2720 wrote to memory of 2500 2720 SGUDBQ.exe SGUDBQ.exe PID 2720 wrote to memory of 2500 2720 SGUDBQ.exe SGUDBQ.exe PID 2720 wrote to memory of 2500 2720 SGUDBQ.exe SGUDBQ.exe PID 2720 wrote to memory of 2500 2720 SGUDBQ.exe SGUDBQ.exe PID 2720 wrote to memory of 2500 2720 SGUDBQ.exe SGUDBQ.exe PID 2500 wrote to memory of 1688 2500 SGUDBQ.exe cmd.exe PID 2500 wrote to memory of 1688 2500 SGUDBQ.exe cmd.exe PID 2500 wrote to memory of 1688 2500 SGUDBQ.exe cmd.exe PID 2500 wrote to memory of 1688 2500 SGUDBQ.exe cmd.exe PID 2500 wrote to memory of 2584 2500 SGUDBQ.exe cmd.exe PID 2500 wrote to memory of 2584 2500 SGUDBQ.exe cmd.exe PID 2500 wrote to memory of 2584 2500 SGUDBQ.exe cmd.exe PID 2500 wrote to memory of 2584 2500 SGUDBQ.exe cmd.exe PID 1688 wrote to memory of 2644 1688 cmd.exe schtasks.exe PID 1688 wrote to memory of 2644 1688 cmd.exe schtasks.exe PID 1688 wrote to memory of 2644 1688 cmd.exe schtasks.exe PID 1688 wrote to memory of 2644 1688 cmd.exe schtasks.exe PID 2584 wrote to memory of 1444 2584 cmd.exe timeout.exe PID 2584 wrote to memory of 1444 2584 cmd.exe timeout.exe PID 2584 wrote to memory of 1444 2584 cmd.exe timeout.exe PID 2584 wrote to memory of 1444 2584 cmd.exe timeout.exe PID 2584 wrote to memory of 1632 2584 cmd.exe audio.exe PID 2584 wrote to memory of 1632 2584 cmd.exe audio.exe PID 2584 wrote to memory of 1632 2584 cmd.exe audio.exe PID 2584 wrote to memory of 1632 2584 cmd.exe audio.exe PID 1632 wrote to memory of 1656 1632 audio.exe audio.exe PID 1632 wrote to memory of 1656 1632 audio.exe audio.exe PID 1632 wrote to memory of 1656 1632 audio.exe audio.exe PID 1632 wrote to memory of 1656 1632 audio.exe audio.exe PID 1632 wrote to memory of 1656 1632 audio.exe audio.exe PID 1632 wrote to memory of 1656 1632 audio.exe audio.exe PID 1632 wrote to memory of 1656 1632 audio.exe audio.exe PID 1632 wrote to memory of 1656 1632 audio.exe audio.exe PID 1632 wrote to memory of 1656 1632 audio.exe audio.exe PID 1632 wrote to memory of 1656 1632 audio.exe audio.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\a47fb3147b531316317dd8150333f7417f6fe196f0ef8656babb070e37d9cc0d.js1⤵
- Blocklisted process makes network request
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\SGUDBQ.exe"C:\Users\Admin\AppData\Local\Temp\SGUDBQ.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\SGUDBQ.exe"C:\Users\Admin\AppData\Local\Temp\SGUDBQ.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "audio" /tr '"C:\Users\Admin\AppData\Local\Temp\audio.exe"' & exit4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "audio" /tr '"C:\Users\Admin\AppData\Local\Temp\audio.exe"'5⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp37A4.tmp.bat""4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout 35⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\Temp\audio.exe"C:\Users\Admin\AppData\Local\Temp\audio.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\audio.exe"C:\Users\Admin\AppData\Local\Temp\audio.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\SGUDBQ.exeFilesize
696KB
MD5f672108901b809c33d38bb6801c9b273
SHA1b5d45949ba7d38b92c20d31cfcae6d437dea8c18
SHA25690e5d1dba754723f6b34acbc974c65467495605f197857569a7ff211aeffca7f
SHA5126f0cae9ca529b197fd5464c6d929437fadfc5c6c36aee5fc7fce1425d5e94cd8a90573c486c339df79ca75b532ef21d9105981eb7650c652db1abc6401c73c25
-
C:\Users\Admin\AppData\Local\Temp\tmp37A4.tmp.batFilesize
152B
MD5c31b1379daea60de586a4286271712af
SHA14a6edb28fb49ae68ed2bc798c2e6d17cfbb99b4a
SHA2563c2a49deb3e750c7c47633959ee419c38fc5487b2806d62a5739d204985bdb36
SHA512047cdbdd03280239314af4a87e6d7f464e67124b980a808d6092e210adaad81585450779fd23cdfe5c1b7f2f2c279036a699bb4b4bdb70f333766c85a3d479a1
-
memory/1632-368-0x0000000000C40000-0x0000000000CF6000-memory.dmpFilesize
728KB
-
memory/2500-77-0x0000000000930000-0x0000000000950000-memory.dmpFilesize
128KB
-
memory/2500-35-0x0000000000660000-0x0000000000688000-memory.dmpFilesize
160KB
-
memory/2500-27-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/2500-26-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/2500-25-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/2500-24-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/2500-73-0x0000000000930000-0x0000000000950000-memory.dmpFilesize
128KB
-
memory/2500-36-0x0000000000930000-0x0000000000956000-memory.dmpFilesize
152KB
-
memory/2500-34-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/2500-364-0x0000000074620000-0x0000000074D0E000-memory.dmpFilesize
6.9MB
-
memory/2500-31-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/2500-71-0x0000000000930000-0x0000000000950000-memory.dmpFilesize
128KB
-
memory/2500-38-0x0000000074620000-0x0000000074D0E000-memory.dmpFilesize
6.9MB
-
memory/2500-39-0x0000000074620000-0x0000000074D0E000-memory.dmpFilesize
6.9MB
-
memory/2500-40-0x0000000000930000-0x0000000000950000-memory.dmpFilesize
128KB
-
memory/2500-93-0x0000000000930000-0x0000000000950000-memory.dmpFilesize
128KB
-
memory/2500-91-0x0000000000930000-0x0000000000950000-memory.dmpFilesize
128KB
-
memory/2500-89-0x0000000000930000-0x0000000000950000-memory.dmpFilesize
128KB
-
memory/2500-87-0x0000000000930000-0x0000000000950000-memory.dmpFilesize
128KB
-
memory/2500-85-0x0000000000930000-0x0000000000950000-memory.dmpFilesize
128KB
-
memory/2500-75-0x0000000000930000-0x0000000000950000-memory.dmpFilesize
128KB
-
memory/2500-81-0x0000000000930000-0x0000000000950000-memory.dmpFilesize
128KB
-
memory/2500-79-0x0000000000930000-0x0000000000950000-memory.dmpFilesize
128KB
-
memory/2500-29-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2500-83-0x0000000000930000-0x0000000000950000-memory.dmpFilesize
128KB
-
memory/2500-28-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/2500-354-0x0000000074620000-0x0000000074D0E000-memory.dmpFilesize
6.9MB
-
memory/2500-69-0x0000000000930000-0x0000000000950000-memory.dmpFilesize
128KB
-
memory/2500-67-0x0000000000930000-0x0000000000950000-memory.dmpFilesize
128KB
-
memory/2500-65-0x0000000000930000-0x0000000000950000-memory.dmpFilesize
128KB
-
memory/2500-63-0x0000000000930000-0x0000000000950000-memory.dmpFilesize
128KB
-
memory/2500-61-0x0000000000930000-0x0000000000950000-memory.dmpFilesize
128KB
-
memory/2500-59-0x0000000000930000-0x0000000000950000-memory.dmpFilesize
128KB
-
memory/2500-57-0x0000000000930000-0x0000000000950000-memory.dmpFilesize
128KB
-
memory/2500-55-0x0000000000930000-0x0000000000950000-memory.dmpFilesize
128KB
-
memory/2500-53-0x0000000000930000-0x0000000000950000-memory.dmpFilesize
128KB
-
memory/2500-51-0x0000000000930000-0x0000000000950000-memory.dmpFilesize
128KB
-
memory/2500-49-0x0000000000930000-0x0000000000950000-memory.dmpFilesize
128KB
-
memory/2500-47-0x0000000000930000-0x0000000000950000-memory.dmpFilesize
128KB
-
memory/2500-45-0x0000000000930000-0x0000000000950000-memory.dmpFilesize
128KB
-
memory/2500-43-0x0000000000930000-0x0000000000950000-memory.dmpFilesize
128KB
-
memory/2500-41-0x0000000000930000-0x0000000000950000-memory.dmpFilesize
128KB
-
memory/2720-22-0x0000000000300000-0x0000000000308000-memory.dmpFilesize
32KB
-
memory/2720-21-0x00000000002E0000-0x00000000002F4000-memory.dmpFilesize
80KB
-
memory/2720-20-0x00000000012B0000-0x0000000001366000-memory.dmpFilesize
728KB
-
memory/2720-19-0x000000007462E000-0x000000007462F000-memory.dmpFilesize
4KB
-
memory/2720-37-0x0000000074620000-0x0000000074D0E000-memory.dmpFilesize
6.9MB
-
memory/2720-698-0x000000007462E000-0x000000007462F000-memory.dmpFilesize
4KB
-
memory/2720-699-0x0000000074620000-0x0000000074D0E000-memory.dmpFilesize
6.9MB