Analysis

  • max time kernel
    545s
  • max time network
    548s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/06/2024, 18:38

General

  • Target

    project labor agreement in nj 55542.js

  • Size

    8.8MB

  • MD5

    09a44be731f54900eb51d0d1a5c95fd1

  • SHA1

    878f9cf7bed86b46c176641b745426b81bed38d9

  • SHA256

    7b31a5d131b246f4250013336af2605a8e0cfe10ba4a8d4ed8e6720886babf90

  • SHA512

    b8fe355e67ceb96533cd781596352b9583696eea93b40c38b59cee509d2057d3f69f98132ce2b7a233b05cf9b4919a07edb82f77c23d9540c400906b3d6e8a39

  • SSDEEP

    49152:r3ytwpCQK+dh3ytwpCQK+dh3ytwpCQK+dh3ytwpCQK+dh3ytwpCQK+dh3ytwpCQJ:rLLLLLLLH

Malware Config

Signatures

  • GootLoader

    JavaScript loader known for delivering other families such as Gootkit and Cobaltstrike.

  • Blocklisted process makes network request 21 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 40 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe "C:\Users\Admin\AppData\Local\Temp\project labor agreement in nj 55542.js"
    1⤵
      PID:4604
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:880
      • C:\Windows\system32\wscript.EXE
        C:\Windows\system32\wscript.EXE CLINIC~1.JS
        1⤵
        • Checks computer location settings
        • Suspicious use of WriteProcessMemory
        PID:3768
        • C:\Windows\System32\cscript.exe
          "C:\Windows\System32\cscript.exe" "CLINIC~1.JS"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1800
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell
            3⤵
            • Blocklisted process makes network request
            • Modifies registry class
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4128
      • C:\Windows\System32\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\project labor agreement in nj 55542.js"
        1⤵
          PID:1420
        • C:\Windows\System32\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\project labor agreement in nj 55542.js"
          1⤵
            PID:1884
          • C:\Windows\System32\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\project labor agreement in nj 55542.js"
            1⤵
              PID:744
            • C:\Windows\System32\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\project labor agreement in nj 55542.js"
              1⤵
                PID:3396

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_wplncb3i.gly.ps1

                Filesize

                60B

                MD5

                d17fe0a3f47be24a6453e9ef58c94641

                SHA1

                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                SHA256

                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                SHA512

                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

              • C:\Users\Admin\AppData\Roaming\Mozilla\CLINIC~1.JS

                Filesize

                41.8MB

                MD5

                42c48432f74812e539fff83bb50603a0

                SHA1

                7adf3ecf4f1e9f28f998cf5f4a20fb3f8dcf9098

                SHA256

                deb50bb38a915351cf6b5e7acbb28aed6190e58f96aa1cb41465aef4726136b5

                SHA512

                59081c4831418b88f18ecc972b85eca21fa3a1f0f5b27f0516695195e9eb248efed64c038f4038b26184b7ed9a8aeba16c5b260dff7e5cb47f7bdf32cf4e5c55

              • memory/4128-12-0x000001B361E00000-0x000001B361E22000-memory.dmp

                Filesize

                136KB

              • memory/4128-13-0x000001B361E80000-0x000001B361EC4000-memory.dmp

                Filesize

                272KB

              • memory/4128-14-0x000001B3622B0000-0x000001B362326000-memory.dmp

                Filesize

                472KB

              • memory/4128-15-0x000001B362530000-0x000001B36255A000-memory.dmp

                Filesize

                168KB

              • memory/4128-16-0x000001B362530000-0x000001B362554000-memory.dmp

                Filesize

                144KB