Analysis
-
max time kernel
93s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
08-06-2024 01:12
Static task
static1
Behavioral task
behavioral1
Sample
Update 124.0.6367.158.js
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
Update 124.0.6367.158.js
Resource
win10v2004-20240508-en
General
-
Target
Update 124.0.6367.158.js
-
Size
3.5MB
-
MD5
11f2b271d98b6d8e2ad624af3c87a5a9
-
SHA1
5540bb84e6a9af516c01ad25eb5e1d9dd42a0e3c
-
SHA256
bea62cbac1011a303dae7d43eec61e9b31d80ea4c92cd0fa1d18a9a04e6a2541
-
SHA512
d984b0102b64bf3b027d9de54e56c9ee8f0ff87a373b97fd8546d9885f610b98e2a889efa1d994b2f0775d56e12a0912e83a16fd258c2680e8cf27c8a12231e4
-
SSDEEP
49152:paZYOjByI+BJ8V6tlBDBFvLBLtmpf+T2vPHr+Z3jb4WsjcqTbsPF5xhyMa81qIdi:Q
Malware Config
Signatures
-
NetSupport
NetSupport is a remote access tool sold as a legitimate system administration software.
-
Blocklisted process makes network request 4 IoCs
flow pid Process 4 4432 wscript.exe 6 4432 wscript.exe 9 4432 wscript.exe 11 4432 wscript.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation wscript.exe -
Executes dropped EXE 1 IoCs
pid Process 3104 client32.exe -
Loads dropped DLL 6 IoCs
pid Process 3104 client32.exe 3104 client32.exe 3104 client32.exe 3104 client32.exe 3104 client32.exe 3104 client32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ = "C:\\ProgramData\\CCleaner1\\client32.exe" wscript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeSecurityPrivilege 3104 client32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3104 client32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4432 wrote to memory of 3104 4432 wscript.exe 90 PID 4432 wrote to memory of 3104 4432 wscript.exe 90 PID 4432 wrote to memory of 3104 4432 wscript.exe 90
Processes
-
C:\Windows\system32\wscript.exewscript.exe "C:\Users\Admin\AppData\Local\Temp\Update 124.0.6367.158.js"1⤵
- Blocklisted process makes network request
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\ProgramData\CCleaner1\client32.exe"C:\ProgramData\CCleaner1\client32.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3104
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.0MB
MD524470e75de8f8c48b4e2218b8bd943a6
SHA1e6ad6e0649cb13e2a967e2e1501e4dd5de7c2eb8
SHA2566191cc00c0c1884b376e43ba38ba51af2acde16e0d1bc86f153e81b60e3dc134
SHA512010af07025a1b5698d0744ddbb16f1ccff4eb52b7883b9331dca64d089ad2c71e304076bd280c07dc406696dbac2f570de33c8b1d44d4b519b2ebb8526c0183e
-
Filesize
320KB
MD5c94005d2dcd2a54e40510344e0bb9435
SHA155b4a1620c5d0113811242c20bd9870a1e31d542
SHA2563c072532bf7674d0c5154d4d22a9d9c0173530c0d00f69911cdbc2552175d899
SHA5122e6f673864a54b1dcad9532ef9b18a9c45c0844f1f53e699fade2f41e43fa5cbc9b8e45e6f37b95f84cf6935a96fba2950ee3e0e9542809fd288fefba34ddd6a
-
Filesize
755KB
MD50e37fbfa79d349d672456923ec5fbbe3
SHA14e880fc7625ccf8d9ca799d5b94ce2b1e7597335
SHA2568793353461826fbd48f25ea8b835be204b758ce7510db2af631b28850355bd18
SHA5122bea9bd528513a3c6a54beac25096ee200a4e6ccfc2a308ae9cfd1ad8738e2e2defd477d59db527a048e5e9a4fe1fc1d771701de14ef82b4dbcdc90df0387630
-
Filesize
258B
MD51b41e64c60ca9dfadeb063cd822ab089
SHA1abfcd51bb120a7eae5bbd9a99624e4abe0c9139d
SHA256f4e2f28169e0c88b2551b6f1d63f8ba513feb15beacc43a82f626b93d673f56d
SHA512c97e0eabea62302a4cfef974ac309f3498505dd055ba74133ee2462e215b3ebc5c647e11bcbac1246b9f750b5d09240ca08a6b617a7007f2fa955f6b6dd7fee4
-
Filesize
18KB
MD5104b30fef04433a2d2fd1d5f99f179fe
SHA1ecb08e224a2f2772d1e53675bedc4b2c50485a41
SHA256956b9fa960f913cce3137089c601f3c64cc24c54614b02bba62abb9610a985dd
SHA5125efcaa8c58813c3a0a6026cd7f3b34ad4fb043fd2d458db2e914429be2b819f1ac74e2d35e4439601cf0cb50fcdcafdcf868da328eaaeec15b0a4a6b8b2c218f
-
Filesize
3.6MB
MD5d3d39180e85700f72aaae25e40c125ff
SHA1f3404ef6322f5c6e7862b507d05b8f4b7f1c7d15
SHA25638684adb2183bf320eb308a96cdbde8d1d56740166c3e2596161f42a40fa32d5
SHA512471ac150e93a182d135e5483d6b1492f08a49f5ccab420732b87210f2188be1577ceaaee4ce162a7acceff5c17cdd08dc51b1904228275f6bbde18022ec79d2f
-
Filesize
170B
MD5cba80ee11de525535bf2068ac23107b0
SHA1479c817e5b4ae2e49e1e950359f072dd8a8d227f
SHA256333654272a482dc66a15d07c778cdfed72e74f6fa50342f00995e26f5dc7678f
SHA5125acdfd8874e3506c65446f5b5022879b74d5faa4d05af36c9835a35e542bab21d81af0f334403f9f3597b12c20c52e2de9377ed7b22466dea3d7ece47810d5f8
-
Filesize
8KB
MD5649c99af46addf93fdd5a214fb56e738
SHA1322376c0cebf89d49f86337d6832441befd7c76f
SHA256c352da21a972a669694c7178deadc41c9be440bd92bdac827fe96b79caac007e
SHA51201fae333dd9480c6e638b151f84afa6a6d3c0f2e9ae0af1dc9c54795ecaa6bfb348ca80f792c0bbb9527a3b1d7b5a701ab637b12a61279e6764173b9c8ff8247
-
Filesize
21KB
MD5757739ea13489d570c0db5ed4c2ddf4d
SHA1b4984c2e8363e8a7b062041b1de9cc39388f27fa
SHA2565dffe9852e3248c2970f54983754af51613714671b743efd019bd0f5ece40cf3
SHA512f4b9ef3404b5c6b5a4ceb9ab3a8b13efb9ccced07e6e37b18508c44700fdaf8bcfbdd603c66204730bbb5de8d05598bbaeb18bd962a99ba52817e74f3846c12b
-
Filesize
26B
MD553a778e164d859f1cc632178e75135fb
SHA1f5a51d3010e756cf5755358fa933edbf25912474
SHA256c0e21afe5ca962b5b06804a0d4fe7f7b0669e66c217d6f5010f7ea9f0573ece8
SHA51278b0a18dd30d25f955fd1533beb3fe26d47fac15ad73298ae1428d98b5eee5ef585e84c00f7056b80aadd40e955828a8b3868e705581a6d75e71bc10187d756c
-
Filesize
101KB
MD5c4f1b50e3111d29774f7525039ff7086
SHA157539c95cba0986ec8df0fcdea433e7c71b724c6
SHA25618df68d1581c11130c139fa52abb74dfd098a9af698a250645d6a4a65efcbf2d
SHA512005db65cedaaccc85525fb3cdab090054bb0bb9cc8c37f8210ec060f490c64945a682b5dd5d00a68ac2b8c58894b6e7d938acaa1130c1cc5667e206d38b942c5
-
Filesize
671B
MD58f5ada97c32cf8802640350080a35f95
SHA1248af4eb242fe0bc91db157666c66124b14f5def
SHA2565106da0bdacd10e4c0f8c10afdba89ce72b8678b5549e7ce4f224b69267e774d
SHA5125db3c4581ca9b237acaa49381abe6b95e25e5b91f42dfe7a1ae29a1a2d78ec887581fa08138fda96e45e4aa8f5711b3e40d659eebdfa5892ab66bacd1b16433a
-
Filesize
32KB
MD534dfb87e4200d852d1fb45dc48f93cfc
SHA135b4e73fb7c8d4c3fefb90b7e7dc19f3e653c641
SHA2562d6c6200508c0797e6542b195c999f3485c4ef76551aa3c65016587788ba1703
SHA512f5bb4e700322cbaa5069244812a9b6ce6899ce15b4fd6384a3e8be421e409e4526b2f67fe210394cd47c4685861faf760eff9af77209100b82b2e0655581c9b2