Analysis
-
max time kernel
288s -
max time network
291s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30-08-2024 12:57
Static task
static1
Behavioral task
behavioral1
Sample
union_of_taxation_employees_collective_agreement(17678).js
Resource
win10v2004-20240802-en
General
-
Target
union_of_taxation_employees_collective_agreement(17678).js
-
Size
4.0MB
-
MD5
4676cd61991f2abc92a0b9e2d10be99b
-
SHA1
2cf90c975093ac69607377992e63d52f9a67e033
-
SHA256
1f11db7a18daabfd2b565045e4da48f5839d3be6a9270aaecd454782927bde16
-
SHA512
c9aa43ef7356e0ac75be85a3d36841525450a79466176a442e86af70587aef36ca3b283f7b8d2df448c8cb3d72d2e8567f31bf3ef28ec0e111d4fe47de56445f
-
SSDEEP
49152:UYqenIoDwoc4yoQu/s+LfHQvYqenIoDwoc4yoQu/s+LfHQvYqenIoDwoc4yoQu/P:UxxI
Malware Config
Signatures
-
GootLoader
JavaScript loader known for delivering other families such as Gootkit and Cobaltstrike.
-
Blocklisted process makes network request 9 IoCs
Processes:
powershell.exeflow pid Process 56 2068 powershell.exe 74 2068 powershell.exe 77 2068 powershell.exe 80 2068 powershell.exe 83 2068 powershell.exe 85 2068 powershell.exe 87 2068 powershell.exe 90 2068 powershell.exe 93 2068 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
wscript.EXEdescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation wscript.EXE -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
Processes:
powershell.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ powershell.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
wscript.EXEcscript.exedescription pid Process procid_target PID 1244 wrote to memory of 384 1244 wscript.EXE 100 PID 1244 wrote to memory of 384 1244 wscript.EXE 100 PID 384 wrote to memory of 2068 384 cscript.exe 102 PID 384 wrote to memory of 2068 384 cscript.exe 102 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\union_of_taxation_employees_collective_agreement(17678).js1⤵PID:4536
-
C:\Windows\system32\wscript.EXEC:\Windows\system32\wscript.EXE ONLINE~1.JS1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Windows\System32\cscript.exe"C:\Windows\System32\cscript.exe" "ONLINE~1.JS"2⤵
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell3⤵
- Blocklisted process makes network request
- Modifies registry class
PID:2068
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39.2MB
MD53f319d850947abf02998276618d2504f
SHA14a563bba89b5f0b873a7e323b0344d129c3da0f3
SHA25649988f7a4c8288fe2bb887e38f9b004d90a8049c815f3a3afae6bc49cdfbd739
SHA5126f524475435384aa24d5805f3c1b4ba0367142d252df562ea56736b14f7e5a14d6dc96a98b53e272a4b9f8aa3cbc4f7e51cbdd7df1017bafeeeda94360fea72e