Analysis
-
max time kernel
1188s -
max time network
855s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
20-09-2024 12:26
Static task
static1
Behavioral task
behavioral1
Sample
GREENH~1.js
Resource
win10-20240404-en
General
-
Target
GREENH~1.js
-
Size
45.6MB
-
MD5
242b497332d9530865c2f289142ee316
-
SHA1
929d35e1b006a260bc5db0d29460bcfcf6b3c7e6
-
SHA256
79caf357853137fc47f9467ddac92602207dcf9775fd07db5cafaf2874f6d20f
-
SHA512
c04f71d9249d3302b91b41138297a4bee889d79d241f1ebde08ca31cc909daba2ef39c6b9d2c8e9f5ef591e5b0f93c6083db6b1d0a3da80453a91e18b60b2f88
-
SSDEEP
3072:eW9W9W9W9W9W9W9W9W9W9W9W9W9W9W9W9W9W9W9W9W9W9W9W9W9W9W9W9W9W9W9f:b
Malware Config
Signatures
-
GootLoader
JavaScript loader known for delivering other families such as Gootkit and Cobaltstrike.
-
Blocklisted process makes network request 1 IoCs
Processes:
powershell.exeflow pid Process 34 3680 powershell.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 2 IoCs
Processes:
powershell.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance powershell.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance powershell.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid Process 4100 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exepid Process 3680 powershell.exe 3680 powershell.exe 3680 powershell.exe 3680 powershell.exe 3680 powershell.exe 3680 powershell.exe 3680 powershell.exe 3680 powershell.exe 3680 powershell.exe 3680 powershell.exe 3680 powershell.exe 3680 powershell.exe 3680 powershell.exe 3680 powershell.exe 3680 powershell.exe 3680 powershell.exe 3680 powershell.exe 3680 powershell.exe 3680 powershell.exe 3680 powershell.exe 3680 powershell.exe 3680 powershell.exe 3680 powershell.exe 3680 powershell.exe 3680 powershell.exe 3680 powershell.exe 3680 powershell.exe 3680 powershell.exe 3680 powershell.exe 3680 powershell.exe 3680 powershell.exe 3680 powershell.exe 3680 powershell.exe 3680 powershell.exe 3680 powershell.exe 3680 powershell.exe 3680 powershell.exe 3680 powershell.exe 3680 powershell.exe 3680 powershell.exe 3680 powershell.exe 3680 powershell.exe 3680 powershell.exe 3680 powershell.exe 3680 powershell.exe 3680 powershell.exe 3680 powershell.exe 3680 powershell.exe 3680 powershell.exe 3680 powershell.exe 3680 powershell.exe 3680 powershell.exe 3680 powershell.exe 3680 powershell.exe 3680 powershell.exe 3680 powershell.exe 3680 powershell.exe 3680 powershell.exe 3680 powershell.exe 3680 powershell.exe 3680 powershell.exe 3680 powershell.exe 3680 powershell.exe 3680 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
powershell.exedescription pid Process Token: SeDebugPrivilege 3680 powershell.exe Token: SeIncreaseQuotaPrivilege 3680 powershell.exe Token: SeSecurityPrivilege 3680 powershell.exe Token: SeTakeOwnershipPrivilege 3680 powershell.exe Token: SeLoadDriverPrivilege 3680 powershell.exe Token: SeSystemProfilePrivilege 3680 powershell.exe Token: SeSystemtimePrivilege 3680 powershell.exe Token: SeProfSingleProcessPrivilege 3680 powershell.exe Token: SeIncBasePriorityPrivilege 3680 powershell.exe Token: SeCreatePagefilePrivilege 3680 powershell.exe Token: SeBackupPrivilege 3680 powershell.exe Token: SeRestorePrivilege 3680 powershell.exe Token: SeShutdownPrivilege 3680 powershell.exe Token: SeDebugPrivilege 3680 powershell.exe Token: SeSystemEnvironmentPrivilege 3680 powershell.exe Token: SeRemoteShutdownPrivilege 3680 powershell.exe Token: SeUndockPrivilege 3680 powershell.exe Token: SeManageVolumePrivilege 3680 powershell.exe Token: 33 3680 powershell.exe Token: 34 3680 powershell.exe Token: 35 3680 powershell.exe Token: 36 3680 powershell.exe Token: SeIncreaseQuotaPrivilege 3680 powershell.exe Token: SeSecurityPrivilege 3680 powershell.exe Token: SeTakeOwnershipPrivilege 3680 powershell.exe Token: SeLoadDriverPrivilege 3680 powershell.exe Token: SeSystemProfilePrivilege 3680 powershell.exe Token: SeSystemtimePrivilege 3680 powershell.exe Token: SeProfSingleProcessPrivilege 3680 powershell.exe Token: SeIncBasePriorityPrivilege 3680 powershell.exe Token: SeCreatePagefilePrivilege 3680 powershell.exe Token: SeBackupPrivilege 3680 powershell.exe Token: SeRestorePrivilege 3680 powershell.exe Token: SeShutdownPrivilege 3680 powershell.exe Token: SeDebugPrivilege 3680 powershell.exe Token: SeSystemEnvironmentPrivilege 3680 powershell.exe Token: SeRemoteShutdownPrivilege 3680 powershell.exe Token: SeUndockPrivilege 3680 powershell.exe Token: SeManageVolumePrivilege 3680 powershell.exe Token: 33 3680 powershell.exe Token: 34 3680 powershell.exe Token: 35 3680 powershell.exe Token: 36 3680 powershell.exe Token: SeIncreaseQuotaPrivilege 3680 powershell.exe Token: SeSecurityPrivilege 3680 powershell.exe Token: SeTakeOwnershipPrivilege 3680 powershell.exe Token: SeLoadDriverPrivilege 3680 powershell.exe Token: SeSystemProfilePrivilege 3680 powershell.exe Token: SeSystemtimePrivilege 3680 powershell.exe Token: SeProfSingleProcessPrivilege 3680 powershell.exe Token: SeIncBasePriorityPrivilege 3680 powershell.exe Token: SeCreatePagefilePrivilege 3680 powershell.exe Token: SeBackupPrivilege 3680 powershell.exe Token: SeRestorePrivilege 3680 powershell.exe Token: SeShutdownPrivilege 3680 powershell.exe Token: SeDebugPrivilege 3680 powershell.exe Token: SeSystemEnvironmentPrivilege 3680 powershell.exe Token: SeRemoteShutdownPrivilege 3680 powershell.exe Token: SeUndockPrivilege 3680 powershell.exe Token: SeManageVolumePrivilege 3680 powershell.exe Token: 33 3680 powershell.exe Token: 34 3680 powershell.exe Token: 35 3680 powershell.exe Token: 36 3680 powershell.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
Processes:
EXCEL.EXEpid Process 4100 EXCEL.EXE 4100 EXCEL.EXE 4100 EXCEL.EXE 4100 EXCEL.EXE 4100 EXCEL.EXE 4100 EXCEL.EXE 4100 EXCEL.EXE 4100 EXCEL.EXE 4100 EXCEL.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
wscript.execscript.exedescription pid Process procid_target PID 4472 wrote to memory of 5112 4472 wscript.exe 75 PID 4472 wrote to memory of 5112 4472 wscript.exe 75 PID 5112 wrote to memory of 3680 5112 cscript.exe 77 PID 5112 wrote to memory of 3680 5112 cscript.exe 77
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\GREENH~1.js1⤵
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Windows\System32\cscript.exe"C:\Windows\System32\cscript.exe" "GREENH~1.js"2⤵
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell3⤵
- Blocklisted process makes network request
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3680
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\Desktop\PushImport.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4100
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a