Analysis
-
max time kernel
84s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 12:07
Static task
static1
Behavioral task
behavioral1
Sample
union_of_taxation_employees_collective_agreement5199.js
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
union_of_taxation_employees_collective_agreement5199.js
Resource
win10v2004-20240802-en
General
-
Target
union_of_taxation_employees_collective_agreement5199.js
-
Size
9.0MB
-
MD5
9f3c383042e789c18b0d5f9711617eae
-
SHA1
ebd6a4b4cc29531e0d0934e3b39d028dcb27de71
-
SHA256
3876d44d7aa8e213ee680f2390850ad2464c98e96f5bddc2fd2a3c2fadfc5686
-
SHA512
2e3519cca51f2477bcaaaee5953f817caecf846d3f44e01ec3670a3698ece5a6cd416dfa0857648eebc19c2e3dcc08072e1e3dba5bb025594d2f55e9ce111237
-
SSDEEP
49152:GQEXJrPV9EQEXJrPV9EQEXJrPV9EQEXJrPV9EQEXJrPV9EQEXJrPV9EQEXJrPV9l:YxPVUxPVUxPVUxPVUxPVUxPVUxPVD
Malware Config
Signatures
-
GootLoader
JavaScript loader known for delivering other families such as Gootkit and Cobaltstrike.
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2872 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2872 powershell.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2948 wrote to memory of 2884 2948 taskeng.exe 30 PID 2948 wrote to memory of 2884 2948 taskeng.exe 30 PID 2948 wrote to memory of 2884 2948 taskeng.exe 30 PID 2884 wrote to memory of 2780 2884 wscript.EXE 31 PID 2884 wrote to memory of 2780 2884 wscript.EXE 31 PID 2884 wrote to memory of 2780 2884 wscript.EXE 31 PID 2780 wrote to memory of 2872 2780 cscript.exe 33 PID 2780 wrote to memory of 2872 2780 cscript.exe 33 PID 2780 wrote to memory of 2872 2780 cscript.exe 33 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\union_of_taxation_employees_collective_agreement5199.js1⤵PID:2328
-
C:\Windows\system32\taskeng.exetaskeng.exe {7F120EC7-D9A8-42C7-BA5A-28D86DF4AA9A} S-1-5-21-2703099537-420551529-3771253338-1000:XECUDNCD\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\system32\wscript.EXEC:\Windows\system32\wscript.EXE CERTIF~1.JS2⤵
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\System32\cscript.exe"C:\Windows\System32\cscript.exe" CERTIF~1.JS3⤵
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2872
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40.4MB
MD581a415c4bb95d2e027b132c81e1223ef
SHA18f0a18608f5e8c4e1209b94dc29af2208e3e8117
SHA25642f897fe0748bbd416e599f74c187847d54a259be5e7a0ad0252ea934005789f
SHA5126477174d3d9bdb97c8bece7ee13ce7a99d4c201ed26a38830ce82952ffb5cc42d2e7184b897499009b6fecf2718bd832292fb5d12280c3d360d59403502d0ad5