Analysis
-
max time kernel
596s -
max time network
600s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10-06-2024 13:29
Static task
static1
Behavioral task
behavioral1
Sample
pa collective agreement pay 13935.js
Resource
win10v2004-20240426-en
General
-
Target
pa collective agreement pay 13935.js
-
Size
4.4MB
-
MD5
528358cafbaf1cfa6419409d6f6e0cd5
-
SHA1
041357f7e759e426cb779868537686e3a6d8d84d
-
SHA256
7f324c4b7ba441b783ec1b02072f86047066d8ad9377876f290e476a6df7ed2f
-
SHA512
3c39fbd4318a9f202deb665023e95211b0a9f31ee943442c9bd3bb043df1ffb376aff46c2dea64bee68b3982cf209b9c148f6398155792bd9740aaa226f44876
-
SSDEEP
49152:4ytwpCQK+PGytwpCQK+PGytwpCQK+PGytwpCQK+Pp:P
Malware Config
Signatures
-
GootLoader
JavaScript loader known for delivering other families such as Gootkit and Cobaltstrike.
-
Blocklisted process makes network request 22 IoCs
Processes:
powershell.exeflow pid process 40 4760 powershell.exe 43 4760 powershell.exe 46 4760 powershell.exe 48 4760 powershell.exe 49 4760 powershell.exe 51 4760 powershell.exe 53 4760 powershell.exe 55 4760 powershell.exe 57 4760 powershell.exe 62 4760 powershell.exe 64 4760 powershell.exe 65 4760 powershell.exe 67 4760 powershell.exe 70 4760 powershell.exe 71 4760 powershell.exe 75 4760 powershell.exe 77 4760 powershell.exe 78 4760 powershell.exe 79 4760 powershell.exe 80 4760 powershell.exe 82 4760 powershell.exe 84 4760 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
wscript.EXEdescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation wscript.EXE -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
Processes:
powershell.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ powershell.exe Key created \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ powershell.exe -
Suspicious behavior: EnumeratesProcesses 42 IoCs
Processes:
powershell.exepid process 4760 powershell.exe 4760 powershell.exe 4760 powershell.exe 4760 powershell.exe 4760 powershell.exe 4760 powershell.exe 4760 powershell.exe 4760 powershell.exe 4760 powershell.exe 4760 powershell.exe 4760 powershell.exe 4760 powershell.exe 4760 powershell.exe 4760 powershell.exe 4760 powershell.exe 4760 powershell.exe 4760 powershell.exe 4760 powershell.exe 4760 powershell.exe 4760 powershell.exe 4760 powershell.exe 4760 powershell.exe 4760 powershell.exe 4760 powershell.exe 4760 powershell.exe 4760 powershell.exe 4760 powershell.exe 4760 powershell.exe 4760 powershell.exe 4760 powershell.exe 4760 powershell.exe 4760 powershell.exe 4760 powershell.exe 4760 powershell.exe 4760 powershell.exe 4760 powershell.exe 4760 powershell.exe 4760 powershell.exe 4760 powershell.exe 4760 powershell.exe 4760 powershell.exe 4760 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 4760 powershell.exe Token: SeIncreaseQuotaPrivilege 4760 powershell.exe Token: SeSecurityPrivilege 4760 powershell.exe Token: SeTakeOwnershipPrivilege 4760 powershell.exe Token: SeLoadDriverPrivilege 4760 powershell.exe Token: SeSystemProfilePrivilege 4760 powershell.exe Token: SeSystemtimePrivilege 4760 powershell.exe Token: SeProfSingleProcessPrivilege 4760 powershell.exe Token: SeIncBasePriorityPrivilege 4760 powershell.exe Token: SeCreatePagefilePrivilege 4760 powershell.exe Token: SeBackupPrivilege 4760 powershell.exe Token: SeRestorePrivilege 4760 powershell.exe Token: SeShutdownPrivilege 4760 powershell.exe Token: SeDebugPrivilege 4760 powershell.exe Token: SeSystemEnvironmentPrivilege 4760 powershell.exe Token: SeRemoteShutdownPrivilege 4760 powershell.exe Token: SeUndockPrivilege 4760 powershell.exe Token: SeManageVolumePrivilege 4760 powershell.exe Token: 33 4760 powershell.exe Token: 34 4760 powershell.exe Token: 35 4760 powershell.exe Token: 36 4760 powershell.exe Token: SeIncreaseQuotaPrivilege 4760 powershell.exe Token: SeSecurityPrivilege 4760 powershell.exe Token: SeTakeOwnershipPrivilege 4760 powershell.exe Token: SeLoadDriverPrivilege 4760 powershell.exe Token: SeSystemProfilePrivilege 4760 powershell.exe Token: SeSystemtimePrivilege 4760 powershell.exe Token: SeProfSingleProcessPrivilege 4760 powershell.exe Token: SeIncBasePriorityPrivilege 4760 powershell.exe Token: SeCreatePagefilePrivilege 4760 powershell.exe Token: SeBackupPrivilege 4760 powershell.exe Token: SeRestorePrivilege 4760 powershell.exe Token: SeShutdownPrivilege 4760 powershell.exe Token: SeDebugPrivilege 4760 powershell.exe Token: SeSystemEnvironmentPrivilege 4760 powershell.exe Token: SeRemoteShutdownPrivilege 4760 powershell.exe Token: SeUndockPrivilege 4760 powershell.exe Token: SeManageVolumePrivilege 4760 powershell.exe Token: 33 4760 powershell.exe Token: 34 4760 powershell.exe Token: 35 4760 powershell.exe Token: 36 4760 powershell.exe Token: SeIncreaseQuotaPrivilege 4760 powershell.exe Token: SeSecurityPrivilege 4760 powershell.exe Token: SeTakeOwnershipPrivilege 4760 powershell.exe Token: SeLoadDriverPrivilege 4760 powershell.exe Token: SeSystemProfilePrivilege 4760 powershell.exe Token: SeSystemtimePrivilege 4760 powershell.exe Token: SeProfSingleProcessPrivilege 4760 powershell.exe Token: SeIncBasePriorityPrivilege 4760 powershell.exe Token: SeCreatePagefilePrivilege 4760 powershell.exe Token: SeBackupPrivilege 4760 powershell.exe Token: SeRestorePrivilege 4760 powershell.exe Token: SeShutdownPrivilege 4760 powershell.exe Token: SeDebugPrivilege 4760 powershell.exe Token: SeSystemEnvironmentPrivilege 4760 powershell.exe Token: SeRemoteShutdownPrivilege 4760 powershell.exe Token: SeUndockPrivilege 4760 powershell.exe Token: SeManageVolumePrivilege 4760 powershell.exe Token: 33 4760 powershell.exe Token: 34 4760 powershell.exe Token: 35 4760 powershell.exe Token: 36 4760 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
wscript.EXEcscript.exedescription pid process target process PID 2688 wrote to memory of 4496 2688 wscript.EXE cscript.exe PID 2688 wrote to memory of 4496 2688 wscript.EXE cscript.exe PID 4496 wrote to memory of 4760 4496 cscript.exe powershell.exe PID 4496 wrote to memory of 4760 4496 cscript.exe powershell.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\wscript.exewscript.exe "C:\Users\Admin\AppData\Local\Temp\pa collective agreement pay 13935.js"1⤵
-
C:\Windows\system32\wscript.EXEC:\Windows\system32\wscript.EXE STRUCT~1.JS1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cscript.exe"C:\Windows\System32\cscript.exe" "STRUCT~1.JS"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell3⤵
- Blocklisted process makes network request
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_u3keik3s.4ub.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Roaming\Adobe\STRUCT~1.JSFilesize
39.2MB
MD5d50c06b61c0745d4aa808cb26150f5a1
SHA1eb1ca2affbf1ee3dc561b891fe021513469128c1
SHA256edb8ecf5879ab431f830f600cc7ff4233a2d178cb41d3c95aaae685748a88d25
SHA5125c5fef225cf141301a733af02844c2aa1534f17b1af9bea5f39053831aec44ed3f4882435ff67e763fb9f5790971733d858712b4f26d02f4266a344a798bd0af
-
memory/4760-8-0x0000023955240000-0x0000023955262000-memory.dmpFilesize
136KB
-
memory/4760-13-0x0000023957580000-0x00000239575C4000-memory.dmpFilesize
272KB
-
memory/4760-14-0x00000239579B0000-0x0000023957A26000-memory.dmpFilesize
472KB
-
memory/4760-15-0x0000023957C10000-0x0000023957C3A000-memory.dmpFilesize
168KB
-
memory/4760-16-0x0000023957C10000-0x0000023957C34000-memory.dmpFilesize
144KB