Analysis

  • max time kernel
    285s
  • max time network
    288s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-08-2024 12:02

General

  • Target

    government_of_bc_collective_agreement(23587).js

  • Size

    7.4MB

  • MD5

    fd5e36cd27aef0d16314b5bb2c5e7ff9

  • SHA1

    a039e3af8095c72a8f4f199a5c77847f94fe51d5

  • SHA256

    07ceb791dffbd73c53e4dda40fb8c98e2b612b320f0f162db95ead6cc2b9dd47

  • SHA512

    d6ce61bfbdca514d75cfa30bc47ed548c968cfbcef992ae0deecec3483b269f92f45aec918a3c22fd01a2b9e252c9a93613f2218c17862198bd826a331fcfce9

  • SSDEEP

    49152:zd64+9dFbEc6GhQt5C8l+4SSNRLFjzW03NZPn3SbYmGBl+Kn8P4BlwUC3kiQijsO:V3y3y3K

Malware Config

Signatures

  • GootLoader

    JavaScript loader known for delivering other families such as Gootkit and Cobaltstrike.

  • Blocklisted process makes network request 10 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\government_of_bc_collective_agreement(23587).js
    1⤵
      PID:4476
    • C:\Windows\system32\wscript.EXE
      C:\Windows\system32\wscript.EXE MEDICA~1.JS
      1⤵
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:2112
      • C:\Windows\System32\cscript.exe
        "C:\Windows\System32\cscript.exe" "MEDICA~1.JS"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1084
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell
          3⤵
          • Blocklisted process makes network request
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4604

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_r5hl2skr.mlx.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Roaming\Microsoft\MEDICA~1.JS

      Filesize

      45.0MB

      MD5

      7c8c7050b3988e0701338438974a6358

      SHA1

      4ab19cf9297d12497a45cd2bbf94b016a82221cd

      SHA256

      50d94dce383259d2855720b579625a91af394d8c33ce457a8d2853f960a2f2f5

      SHA512

      f9e29f00125a6e9c9741208f029c1a62c72fdbaf48c12ecc54ed0aa2e3e2b0c585983043fbd2cd970ab63470007c218b8a4afc1ac20af134d67208745dfee50a

    • memory/4604-3-0x00000155F4370000-0x00000155F4392000-memory.dmp

      Filesize

      136KB

    • memory/4604-13-0x00000155F4880000-0x00000155F48C4000-memory.dmp

      Filesize

      272KB

    • memory/4604-14-0x00000155F4950000-0x00000155F49C6000-memory.dmp

      Filesize

      472KB

    • memory/4604-15-0x00000155F4BC0000-0x00000155F4BEA000-memory.dmp

      Filesize

      168KB

    • memory/4604-16-0x00000155F4BC0000-0x00000155F4BE4000-memory.dmp

      Filesize

      144KB