Resubmissions
21-06-2024 12:37
240621-ptjematemr 321-06-2024 12:08
240621-paxg5sygkd 121-06-2024 12:05
240621-n9n5dasgpn 121-06-2024 12:05
240621-n9fs1ayfpc 121-06-2024 12:05
240621-n87v4asgmq 321-06-2024 06:25
240621-g6p4yatfjl 113-06-2024 04:58
240613-flzbfaydrn 10Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
13-06-2024 04:58
Static task
static1
Behavioral task
behavioral1
Sample
Tax Returns of R48_765.js
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
Tax Returns of R48_765.js
Resource
win11-20240508-en
General
-
Target
Tax Returns of R48_765.js
-
Size
957KB
-
MD5
0f597e6821a29bc87b36222f08eff311
-
SHA1
e7f24cd04de9b92c013d71d3de526461cfb33c91
-
SHA256
df018cc7e708b47edfe4f39769058ce0ba10a65fe653d3a32412dd504d3f2028
-
SHA512
693ed1331f7f048789c11bc661949519149c43e3a76b3b600a1990f74763500a6b4a5efb532921bcdb58b27f3a136af9ba63e2e1dce4094fe078076d0073f1a7
-
SSDEEP
6144:QQ5C90ha3hcY0c5OyZD5i8frkU+uKCbbBGZs3xh527wIy+6Y16vLKdYoiAL1Xl4R:TKF
Malware Config
Signatures
-
Drops startup file 2 IoCs
Processes:
wscript.exewscript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Tax Returns of R48_765.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Tax Returns of R48_765.js wscript.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 1 ip-api.com -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
msedge.exemsedge.exemsedge.exeidentity_helper.exemsedge.exepid process 424 msedge.exe 424 msedge.exe 3552 msedge.exe 3552 msedge.exe 844 msedge.exe 844 msedge.exe 1576 identity_helper.exe 1576 identity_helper.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
Processes:
msedge.exepid process 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
Processes:
msedge.exepid process 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
wscript.exemsedge.exedescription pid process target process PID 400 wrote to memory of 1864 400 wscript.exe wscript.exe PID 400 wrote to memory of 1864 400 wscript.exe wscript.exe PID 3552 wrote to memory of 4664 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 4664 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 2864 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 2864 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 2864 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 2864 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 2864 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 2864 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 2864 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 2864 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 2864 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 2864 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 2864 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 2864 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 2864 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 2864 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 2864 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 2864 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 2864 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 2864 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 2864 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 2864 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 2864 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 2864 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 2864 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 2864 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 2864 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 2864 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 2864 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 2864 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 2864 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 2864 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 2864 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 2864 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 2864 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 2864 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 2864 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 2864 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 2864 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 2864 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 2864 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 2864 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 424 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 424 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 4828 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 4828 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 4828 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 4828 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 4828 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 4828 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 4828 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 4828 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 4828 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 4828 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 4828 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 4828 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 4828 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 4828 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 4828 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 4828 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 4828 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 4828 3552 msedge.exe msedge.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe "C:\Users\Admin\AppData\Local\Temp\Tax Returns of R48_765.js"1⤵
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\Tax Returns of R48_765.js"2⤵
- Drops startup file
PID:1864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3552 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffa499a3cb8,0x7ffa499a3cc8,0x7ffa499a3cd82⤵PID:4664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1900,13561495596375488964,797456159624775203,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1928 /prefetch:22⤵PID:2864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1900,13561495596375488964,797456159624775203,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1900,13561495596375488964,797456159624775203,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2784 /prefetch:82⤵PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,13561495596375488964,797456159624775203,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:12⤵PID:924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,13561495596375488964,797456159624775203,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:12⤵PID:2156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,13561495596375488964,797456159624775203,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4600 /prefetch:12⤵PID:2800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,13561495596375488964,797456159624775203,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4640 /prefetch:12⤵PID:2868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1900,13561495596375488964,797456159624775203,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4304 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,13561495596375488964,797456159624775203,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4544 /prefetch:12⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,13561495596375488964,797456159624775203,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4852 /prefetch:12⤵PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1900,13561495596375488964,797456159624775203,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5380 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,13561495596375488964,797456159624775203,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3492 /prefetch:12⤵PID:956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1900,13561495596375488964,797456159624775203,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1020 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3120
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3356
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4112
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c1c7e2f451eb3836d23007799bc21d5f
SHA111a25f6055210aa7f99d77346b0d4f1dc123ce79
SHA256429a870d582c77c8a661c8cc3f4afa424ed5faf64ce722f51a6a74f66b21c800
SHA5122ca40bbbe76488dff4b10cca78a81ecf2e97d75cd65f301da4414d93e08e33f231171d455b0dbf012b2d4735428e835bf3631f678f0ab203383e315da2d23a34
-
Filesize
152B
MD56876cbd342d4d6b236f44f52c50f780f
SHA1a215cf6a499bfb67a3266d211844ec4c82128d83
SHA256ca5a6320d94ee74db11e55893a42a52c56c8f067cba35594d507b593d993451e
SHA512dff3675753b6b733ffa2da73d28a250a52ab29620935960673d77fe2f90d37a273c8c6afdf87db959bdb49f31b69b41f7aa4febac5bbdd43a9706a4dd9705039
-
Filesize
5KB
MD5b5651f6ac984ef03ea6b25d8adb4f1a5
SHA1843b0acc3d9eadf9b0d969aba9201b4fbe4bf38d
SHA256e51d68f2e13315545ef7aaaf1b860ee2525c77273946426d9d5948195fc5a137
SHA512c2c2bc02dcfcd6fc61144230614843bbe968ca715a48e878dc7de8d21683f372c8b6c4536d6d5cf81d100388644eb1508abf3ace7a35b62faae726a9e36cb360
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
8KB
MD515d6e4f1567d6beea52d929e5d50c815
SHA1a8af3893a8aea52e2cd7ed627e0b85e05b5c4df4
SHA256459ca419b7e23e6540649fbcfcb2498e1a8b16c255e63d0dba6d8a4cbd02e93e
SHA5129a7a35955f005973f5950e9a2b34b625de75e02b9f607fb46fdfd499a4639fdc200e8513301c07b0eb451c3a479050689494e5b7e2226b3f1761e3488ae1c673
-
Filesize
957KB
MD50f597e6821a29bc87b36222f08eff311
SHA1e7f24cd04de9b92c013d71d3de526461cfb33c91
SHA256df018cc7e708b47edfe4f39769058ce0ba10a65fe653d3a32412dd504d3f2028
SHA512693ed1331f7f048789c11bc661949519149c43e3a76b3b600a1990f74763500a6b4a5efb532921bcdb58b27f3a136af9ba63e2e1dce4094fe078076d0073f1a7
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e