Analysis
-
max time kernel
76s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
17-09-2024 12:01
Static task
static1
Behavioral task
behavioral1
Sample
2546f52e0cf411d80ff158ad99205838506f6a1234089041fa4e42222814e225.js
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2546f52e0cf411d80ff158ad99205838506f6a1234089041fa4e42222814e225.js
Resource
win10v2004-20240802-en
General
-
Target
2546f52e0cf411d80ff158ad99205838506f6a1234089041fa4e42222814e225.js
-
Size
8.0MB
-
MD5
0c0ecbd4c1162944fd19a4855b8598ff
-
SHA1
b2e9c8cadc27e695109f804d3fccd428d6a66e60
-
SHA256
2546f52e0cf411d80ff158ad99205838506f6a1234089041fa4e42222814e225
-
SHA512
b195c10ca1ad1a673790b828c9a626429d6e85e62b17ed1313cb8fa53d976bc101d5ee32d943db4d4154474c22f6e1420fb8e0254d94fcefd5b6af8a2b347992
-
SSDEEP
49152:uEF3nc5PwmcieVn/s+LfHQtEF3nc5PwmcieVn/s+LfHQtEF3nc5PwmcieVn/s+LX:uppppp6
Malware Config
Signatures
-
GootLoader
JavaScript loader known for delivering other families such as Gootkit and Cobaltstrike.
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid Process 2216 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid Process Token: SeDebugPrivilege 2216 powershell.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
taskeng.exewscript.EXEcscript.exedescription pid Process procid_target PID 2840 wrote to memory of 2748 2840 taskeng.exe 30 PID 2840 wrote to memory of 2748 2840 taskeng.exe 30 PID 2840 wrote to memory of 2748 2840 taskeng.exe 30 PID 2748 wrote to memory of 2728 2748 wscript.EXE 31 PID 2748 wrote to memory of 2728 2748 wscript.EXE 31 PID 2748 wrote to memory of 2728 2748 wscript.EXE 31 PID 2728 wrote to memory of 2216 2728 cscript.exe 33 PID 2728 wrote to memory of 2216 2728 cscript.exe 33 PID 2728 wrote to memory of 2216 2728 cscript.exe 33 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\2546f52e0cf411d80ff158ad99205838506f6a1234089041fa4e42222814e225.js1⤵PID:2904
-
C:\Windows\system32\taskeng.exetaskeng.exe {5B599019-CEC4-4D8A-85AA-793DFE68DEE2} S-1-5-21-1506706701-1246725540-2219210854-1000:MUYDDIIS\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\system32\wscript.EXEC:\Windows\system32\wscript.EXE CURREN~1.JS2⤵
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\System32\cscript.exe"C:\Windows\System32\cscript.exe" "CURREN~1.JS"3⤵
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2216
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38.6MB
MD5042ec94f0953da9ff0ab08c94c00797e
SHA150def21b2157747a1cea6eaf900c0e0bb85c418f
SHA256a3375ebec3804e8ba84f71b848baaf41450aa58ef9b70341fca301267e287df5
SHA5126010122cd874f2c25c0977e47d71555e11851b8079a4b2e133bf1764b67e57a84eb9b46feec426dec306294b65e97d97ec540d84e7456467aa2062bc9d9d5369