Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
30-08-2024 15:42
Static task
static1
Behavioral task
behavioral1
Sample
1771f94e898e28e8d9e6eac9ff8fa457ca17948d4599890915b833e71106982c.js
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
1771f94e898e28e8d9e6eac9ff8fa457ca17948d4599890915b833e71106982c.js
Resource
win10v2004-20240802-en
General
-
Target
1771f94e898e28e8d9e6eac9ff8fa457ca17948d4599890915b833e71106982c.js
-
Size
5.3MB
-
MD5
c34769845b3c81530e785a2539d55ad9
-
SHA1
f429bbe44bc3c633b7675175708c76093003feff
-
SHA256
1771f94e898e28e8d9e6eac9ff8fa457ca17948d4599890915b833e71106982c
-
SHA512
c1d9a7db007e82d8ff2a60be97b1096e28beec1fbed847db0d4656b447441d4317d32159261a4eaf53022702c81256a4adb79c6fce50a82b9b88c15ee14a4ace
-
SSDEEP
49152:tWR+nGElwTrd6gG/s+LfHQ0WR+nGElwTrd6gG/s+LfHQ0WR+nGElwTrd6gG/s+Lr:trrr9
Malware Config
Signatures
-
GootLoader
JavaScript loader known for delivering other families such as Gootkit and Cobaltstrike.
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid Process 2820 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid Process Token: SeDebugPrivilege 2820 powershell.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
taskeng.exewscript.EXEcscript.exedescription pid Process procid_target PID 2856 wrote to memory of 2904 2856 taskeng.exe 32 PID 2856 wrote to memory of 2904 2856 taskeng.exe 32 PID 2856 wrote to memory of 2904 2856 taskeng.exe 32 PID 2904 wrote to memory of 2912 2904 wscript.EXE 33 PID 2904 wrote to memory of 2912 2904 wscript.EXE 33 PID 2904 wrote to memory of 2912 2904 wscript.EXE 33 PID 2912 wrote to memory of 2820 2912 cscript.exe 35 PID 2912 wrote to memory of 2820 2912 cscript.exe 35 PID 2912 wrote to memory of 2820 2912 cscript.exe 35 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\1771f94e898e28e8d9e6eac9ff8fa457ca17948d4599890915b833e71106982c.js1⤵PID:1952
-
C:\Windows\system32\taskeng.exetaskeng.exe {B260FF70-166C-48C1-B43D-02CBAAB5A13C} S-1-5-21-3434294380-2554721341-1919518612-1000:ELZYPTFV\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\system32\wscript.EXEC:\Windows\system32\wscript.EXE VIRTUA~1.JS2⤵
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\System32\cscript.exe"C:\Windows\System32\cscript.exe" "VIRTUA~1.JS"3⤵
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2820
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45.7MB
MD5fa33856cdd141858ba2ac178f7fa578e
SHA1f1679423b57a78d29e7a46962a89e08f29db0f55
SHA25683c748a7477453552193038657cd29fbc47cea50cb77ec52767ee7091f7af6f8
SHA51297a728ce3576bec8512e069d150a75695450176443243655b62b126abdbeace6bfe93979959d150f82362c375f3e688543cc29f2ad4ed6fb3c1bdf679fcf710f