Resubmissions

20-09-2024 13:16

240920-qh5n6ayakf 10

20-09-2024 12:26

240920-pmlw6swgmr 10

Analysis

  • max time kernel
    1188s
  • max time network
    855s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    20-09-2024 12:26

General

  • Target

    GREENH~1.js

  • Size

    45.6MB

  • MD5

    242b497332d9530865c2f289142ee316

  • SHA1

    929d35e1b006a260bc5db0d29460bcfcf6b3c7e6

  • SHA256

    79caf357853137fc47f9467ddac92602207dcf9775fd07db5cafaf2874f6d20f

  • SHA512

    c04f71d9249d3302b91b41138297a4bee889d79d241f1ebde08ca31cc909daba2ef39c6b9d2c8e9f5ef591e5b0f93c6083db6b1d0a3da80453a91e18b60b2f88

  • SSDEEP

    3072:eW9W9W9W9W9W9W9W9W9W9W9W9W9W9W9W9W9W9W9W9W9W9W9W9W9W9W9W9W9W9W9f:b

Malware Config

Signatures

  • GootLoader

    JavaScript loader known for delivering other families such as Gootkit and Cobaltstrike.

  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\GREENH~1.js
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4472
    • C:\Windows\System32\cscript.exe
      "C:\Windows\System32\cscript.exe" "GREENH~1.js"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:5112
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell
        3⤵
        • Blocklisted process makes network request
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3680
  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\Desktop\PushImport.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:4100

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_qev14f11.xgy.ps1

    Filesize

    1B

    MD5

    c4ca4238a0b923820dcc509a6f75849b

    SHA1

    356a192b7913b04c54574d18c28d46e6395428ab

    SHA256

    6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

    SHA512

    4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

  • memory/3680-4-0x000001B81DE60000-0x000001B81DE82000-memory.dmp

    Filesize

    136KB

  • memory/3680-31-0x000001B81E0F0000-0x000001B81E12C000-memory.dmp

    Filesize

    240KB

  • memory/3680-42-0x000001B81E510000-0x000001B81E586000-memory.dmp

    Filesize

    472KB

  • memory/3680-863-0x000001B81E7A0000-0x000001B81E7C2000-memory.dmp

    Filesize

    136KB

  • memory/3680-844-0x000001B81E7A0000-0x000001B81E7CA000-memory.dmp

    Filesize

    168KB

  • memory/4100-534-0x00007FFAE0740000-0x00007FFAE0750000-memory.dmp

    Filesize

    64KB

  • memory/4100-531-0x00007FFAE34B0000-0x00007FFAE34C0000-memory.dmp

    Filesize

    64KB

  • memory/4100-530-0x00007FFAE34B0000-0x00007FFAE34C0000-memory.dmp

    Filesize

    64KB

  • memory/4100-535-0x00007FFAE0740000-0x00007FFAE0750000-memory.dmp

    Filesize

    64KB

  • memory/4100-529-0x00007FFAE34B0000-0x00007FFAE34C0000-memory.dmp

    Filesize

    64KB

  • memory/4100-528-0x00007FFAE34B0000-0x00007FFAE34C0000-memory.dmp

    Filesize

    64KB

  • memory/4100-915-0x00007FFAE34B0000-0x00007FFAE34C0000-memory.dmp

    Filesize

    64KB

  • memory/4100-917-0x00007FFAE34B0000-0x00007FFAE34C0000-memory.dmp

    Filesize

    64KB

  • memory/4100-918-0x00007FFAE34B0000-0x00007FFAE34C0000-memory.dmp

    Filesize

    64KB

  • memory/4100-916-0x00007FFAE34B0000-0x00007FFAE34C0000-memory.dmp

    Filesize

    64KB