Analysis

  • max time kernel
    72s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    02-08-2024 20:41

General

  • Target

    409f0ffb96db2598ee8aee7800b3d6d2b1f751c241f5a2f8062d34515f5b3137.js

  • Size

    23.2MB

  • MD5

    b138e06a4863f6356ce014a0f63d1406

  • SHA1

    506b43b59c71118165f161705ed995803a4ba0a6

  • SHA256

    409f0ffb96db2598ee8aee7800b3d6d2b1f751c241f5a2f8062d34515f5b3137

  • SHA512

    cf9e660ed86c53bb7f7e492957eca25a87080eccb9b6b8940b61df91cf1c7b32677c7bffc5cbf65b8c53048b2184cbd53d98b4de2ba11ba96dd65266a11a1306

  • SSDEEP

    49152:SBC08dPXWR4ba/JOtdF5pHE2lsfiaahM3o43ORV59VDKtDNBC08dPXWR4ba/JOtN:ic43m0c43m0c43m0c43m0c43ml

Malware Config

Signatures

  • GootLoader

    JavaScript loader known for delivering other families such as Gootkit and Cobaltstrike.

  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\409f0ffb96db2598ee8aee7800b3d6d2b1f751c241f5a2f8062d34515f5b3137.js
    1⤵
      PID:1544
    • C:\Windows\system32\taskeng.exe
      taskeng.exe {4B3B78F1-46A9-4072-92CB-9A2E105E288B} S-1-5-21-2172136094-3310281978-782691160-1000:EXCFTDUU\Admin:Interactive:[1]
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:2924
      • C:\Windows\system32\wscript.EXE
        C:\Windows\system32\wscript.EXE CREATI~1.JS
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2968
        • C:\Windows\System32\cscript.exe
          "C:\Windows\System32\cscript.exe" "CREATI~1.JS"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2740
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2508

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Macromedia\CREATI~1.JS

      Filesize

      42.8MB

      MD5

      e88346ec9933c20d9fb46208d8f6615b

      SHA1

      8384080b4b0d4b6edbecdc62585f090aa205e2d7

      SHA256

      0f725f3877a9ac7a5fc9887ccdef10d5cbeb20098a159be7dbbc4a8d4a5dafe6

      SHA512

      fc0ec0188440ff0dd850407d60456f7ef3328626a9e7636f24c42c48ce7a2b716ae85345154854179be90efb0a0b4303ce03d1fb059ac8d3510c474b67b9dc9f

    • memory/2508-7-0x000000001B6D0000-0x000000001B9B2000-memory.dmp

      Filesize

      2.9MB

    • memory/2508-8-0x0000000001D90000-0x0000000001D98000-memory.dmp

      Filesize

      32KB