Analysis
-
max time kernel
131s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17-09-2024 12:01
Static task
static1
Behavioral task
behavioral1
Sample
2546f52e0cf411d80ff158ad99205838506f6a1234089041fa4e42222814e225.js
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2546f52e0cf411d80ff158ad99205838506f6a1234089041fa4e42222814e225.js
Resource
win10v2004-20240802-en
General
-
Target
2546f52e0cf411d80ff158ad99205838506f6a1234089041fa4e42222814e225.js
-
Size
8.0MB
-
MD5
0c0ecbd4c1162944fd19a4855b8598ff
-
SHA1
b2e9c8cadc27e695109f804d3fccd428d6a66e60
-
SHA256
2546f52e0cf411d80ff158ad99205838506f6a1234089041fa4e42222814e225
-
SHA512
b195c10ca1ad1a673790b828c9a626429d6e85e62b17ed1313cb8fa53d976bc101d5ee32d943db4d4154474c22f6e1420fb8e0254d94fcefd5b6af8a2b347992
-
SSDEEP
49152:uEF3nc5PwmcieVn/s+LfHQtEF3nc5PwmcieVn/s+LfHQtEF3nc5PwmcieVn/s+LX:uppppp6
Malware Config
Signatures
-
GootLoader
JavaScript loader known for delivering other families such as Gootkit and Cobaltstrike.
-
Blocklisted process makes network request 5 IoCs
Processes:
powershell.exeflow pid Process 42 4300 powershell.exe 53 4300 powershell.exe 55 4300 powershell.exe 57 4300 powershell.exe 66 4300 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
wscript.EXEdescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation wscript.EXE -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
Processes:
powershell.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ powershell.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ powershell.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
powershell.exepid Process 4300 powershell.exe 4300 powershell.exe 4300 powershell.exe 4300 powershell.exe 4300 powershell.exe 4300 powershell.exe 4300 powershell.exe 4300 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
powershell.exedescription pid Process Token: SeDebugPrivilege 4300 powershell.exe Token: SeIncreaseQuotaPrivilege 4300 powershell.exe Token: SeSecurityPrivilege 4300 powershell.exe Token: SeTakeOwnershipPrivilege 4300 powershell.exe Token: SeLoadDriverPrivilege 4300 powershell.exe Token: SeSystemProfilePrivilege 4300 powershell.exe Token: SeSystemtimePrivilege 4300 powershell.exe Token: SeProfSingleProcessPrivilege 4300 powershell.exe Token: SeIncBasePriorityPrivilege 4300 powershell.exe Token: SeCreatePagefilePrivilege 4300 powershell.exe Token: SeBackupPrivilege 4300 powershell.exe Token: SeRestorePrivilege 4300 powershell.exe Token: SeShutdownPrivilege 4300 powershell.exe Token: SeDebugPrivilege 4300 powershell.exe Token: SeSystemEnvironmentPrivilege 4300 powershell.exe Token: SeRemoteShutdownPrivilege 4300 powershell.exe Token: SeUndockPrivilege 4300 powershell.exe Token: SeManageVolumePrivilege 4300 powershell.exe Token: 33 4300 powershell.exe Token: 34 4300 powershell.exe Token: 35 4300 powershell.exe Token: 36 4300 powershell.exe Token: SeIncreaseQuotaPrivilege 4300 powershell.exe Token: SeSecurityPrivilege 4300 powershell.exe Token: SeTakeOwnershipPrivilege 4300 powershell.exe Token: SeLoadDriverPrivilege 4300 powershell.exe Token: SeSystemProfilePrivilege 4300 powershell.exe Token: SeSystemtimePrivilege 4300 powershell.exe Token: SeProfSingleProcessPrivilege 4300 powershell.exe Token: SeIncBasePriorityPrivilege 4300 powershell.exe Token: SeCreatePagefilePrivilege 4300 powershell.exe Token: SeBackupPrivilege 4300 powershell.exe Token: SeRestorePrivilege 4300 powershell.exe Token: SeShutdownPrivilege 4300 powershell.exe Token: SeDebugPrivilege 4300 powershell.exe Token: SeSystemEnvironmentPrivilege 4300 powershell.exe Token: SeRemoteShutdownPrivilege 4300 powershell.exe Token: SeUndockPrivilege 4300 powershell.exe Token: SeManageVolumePrivilege 4300 powershell.exe Token: 33 4300 powershell.exe Token: 34 4300 powershell.exe Token: 35 4300 powershell.exe Token: 36 4300 powershell.exe Token: SeIncreaseQuotaPrivilege 4300 powershell.exe Token: SeSecurityPrivilege 4300 powershell.exe Token: SeTakeOwnershipPrivilege 4300 powershell.exe Token: SeLoadDriverPrivilege 4300 powershell.exe Token: SeSystemProfilePrivilege 4300 powershell.exe Token: SeSystemtimePrivilege 4300 powershell.exe Token: SeProfSingleProcessPrivilege 4300 powershell.exe Token: SeIncBasePriorityPrivilege 4300 powershell.exe Token: SeCreatePagefilePrivilege 4300 powershell.exe Token: SeBackupPrivilege 4300 powershell.exe Token: SeRestorePrivilege 4300 powershell.exe Token: SeShutdownPrivilege 4300 powershell.exe Token: SeDebugPrivilege 4300 powershell.exe Token: SeSystemEnvironmentPrivilege 4300 powershell.exe Token: SeRemoteShutdownPrivilege 4300 powershell.exe Token: SeUndockPrivilege 4300 powershell.exe Token: SeManageVolumePrivilege 4300 powershell.exe Token: 33 4300 powershell.exe Token: 34 4300 powershell.exe Token: 35 4300 powershell.exe Token: 36 4300 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
wscript.EXEcscript.exedescription pid Process procid_target PID 3740 wrote to memory of 5096 3740 wscript.EXE 101 PID 3740 wrote to memory of 5096 3740 wscript.EXE 101 PID 5096 wrote to memory of 4300 5096 cscript.exe 103 PID 5096 wrote to memory of 4300 5096 cscript.exe 103 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\2546f52e0cf411d80ff158ad99205838506f6a1234089041fa4e42222814e225.js1⤵PID:1328
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4252,i,2727319350781907497,7925939240893079607,262144 --variations-seed-version --mojo-platform-channel-handle=3004 /prefetch:81⤵PID:4752
-
C:\Windows\system32\wscript.EXEC:\Windows\system32\wscript.EXE CURREN~1.JS1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3740 -
C:\Windows\System32\cscript.exe"C:\Windows\System32\cscript.exe" "CURREN~1.JS"2⤵
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell3⤵
- Blocklisted process makes network request
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4300
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
38.6MB
MD5042ec94f0953da9ff0ab08c94c00797e
SHA150def21b2157747a1cea6eaf900c0e0bb85c418f
SHA256a3375ebec3804e8ba84f71b848baaf41450aa58ef9b70341fca301267e287df5
SHA5126010122cd874f2c25c0977e47d71555e11851b8079a4b2e133bf1764b67e57a84eb9b46feec426dec306294b65e97d97ec540d84e7456467aa2062bc9d9d5369