Analysis
-
max time kernel
594s -
max time network
599s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-09-2024 16:43
Static task
static1
Behavioral task
behavioral1
Sample
RFQ_PO_KMM7983972_ORDER_DETAILS.js
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
RFQ_PO_KMM7983972_ORDER_DETAILS.js
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
RFQ_PO_KMM7983972_ORDER_DETAILS.js
Resource
win10v2004-20240802-en
General
-
Target
RFQ_PO_KMM7983972_ORDER_DETAILS.js
-
Size
4.6MB
-
MD5
cd0f549f054ceab42921cf3979164fcd
-
SHA1
a4045303bdb5b2e5e32e515a29dd3f43fc2cd4c3
-
SHA256
0c3672c680c56eb694c95914c7ea78a7fd0667c8b88c02c9b0b988cb520c3983
-
SHA512
dd614ea2258f39e989922ef48d380cf4530c5f9bd69e724d955f2f5b256a2cdbb7b8c8a9f1e925329553720573f2c4f3b9321b65fbc45e58a5495c562b150f3f
-
SSDEEP
49152:Dy0k7Tbm+wKoJjMRRfQTr95R5NDE97TydtK1B0v3qyPAmYEHgdkgJWyLJe/BG0PF:d
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation wscript.exe -
Executes dropped EXE 1 IoCs
pid Process 1036 x.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral3/files/0x000800000002360e-5.dat autoit_exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 6136 1036 WerFault.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language x.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3908 wrote to memory of 1036 3908 wscript.exe 89 PID 3908 wrote to memory of 1036 3908 wscript.exe 89 PID 3908 wrote to memory of 1036 3908 wscript.exe 89 PID 1036 wrote to memory of 5488 1036 x.exe 90 PID 1036 wrote to memory of 5488 1036 x.exe 90 PID 1036 wrote to memory of 5488 1036 x.exe 90
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\RFQ_PO_KMM7983972_ORDER_DETAILS.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Users\Admin\AppData\Local\Temp\x.exe"C:\Users\Admin\AppData\Local\Temp\x.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\x.exe"3⤵PID:5488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1036 -s 7403⤵
- Program crash
PID:6136
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1036 -ip 10361⤵PID:1228
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4300,i,2904906934812054273,11716976550456127484,262144 --variations-seed-version --mojo-platform-channel-handle=4384 /prefetch:81⤵PID:3772
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=1284,i,2904906934812054273,11716976550456127484,262144 --variations-seed-version --mojo-platform-channel-handle=3816 /prefetch:81⤵PID:3436
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.5MB
MD516169512f2e05c8e01449e52ea10b525
SHA10724ad3ada6f7b87d0be9fe051da3e50449d9775
SHA2560b232cd5b3cd6d2ba6d618a0bb68711901d2746be6dbdc67df1242459e0e5c5a
SHA5127487faa357cdf96653d84d4b028725fa8650614bf6801ca61c78f2a4f42f8ac288172ae5eaa52365143aaf7edb9fd62ebdc40a6e578b897875eb682f8e299611