Resubmissions
06-11-2024 14:57
241106-sbs3ws1paw 329-10-2024 14:27
241029-rsdtvswdjh 1004-09-2024 18:25
240904-w2ngwavbmq 10Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-10-2024 14:27
Static task
static1
Behavioral task
behavioral1
Sample
unionoftaxationemployeescollectiveagreement91985.js
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
unionoftaxationemployeescollectiveagreement91985.js
Resource
win10v2004-20241007-en
General
-
Target
unionoftaxationemployeescollectiveagreement91985.js
-
Size
8.0MB
-
MD5
cabe44b59e1b9d2e16c944787ac48e61
-
SHA1
d5111f4a5432aef1d4cd4aa632958e4d90b102ee
-
SHA256
5ea87676fa668a09c1db2988aadf70e29a377c172f17f1ed48b34d09730ebb47
-
SHA512
b7b81d2df403b88d84b075671dc0604f9a9b6e637f99050f14ef5d947d5ff1a99de3f7a5604df0470949bd856cabbface9c46a8d5d9bde37efc8f88bd5d2318d
-
SSDEEP
49152:/y+nncMHwtllKdy/s+LfHQiy+nncMHwtllKdy/s+LfHQiy+nncMHwtllKdy/s+LO:/MMMMMY
Malware Config
Signatures
-
GootLoader
JavaScript loader known for delivering other families such as Gootkit and Cobaltstrike.
-
Gootloader family
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1516 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1516 powershell.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2868 wrote to memory of 2700 2868 taskeng.exe 32 PID 2868 wrote to memory of 2700 2868 taskeng.exe 32 PID 2868 wrote to memory of 2700 2868 taskeng.exe 32 PID 2700 wrote to memory of 2688 2700 wscript.EXE 33 PID 2700 wrote to memory of 2688 2700 wscript.EXE 33 PID 2700 wrote to memory of 2688 2700 wscript.EXE 33 PID 2688 wrote to memory of 1516 2688 cscript.exe 35 PID 2688 wrote to memory of 1516 2688 cscript.exe 35 PID 2688 wrote to memory of 1516 2688 cscript.exe 35 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\unionoftaxationemployeescollectiveagreement91985.js1⤵PID:2896
-
C:\Windows\system32\taskeng.exetaskeng.exe {52BDFBD3-3D18-4C57-AB90-DD64F7A1A76A} S-1-5-21-3290804112-2823094203-3137964600-1000:VORHPBAB\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\system32\wscript.EXEC:\Windows\system32\wscript.EXE BEHAVI~1.JS2⤵
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\System32\cscript.exe"C:\Windows\System32\cscript.exe" "BEHAVI~1.JS"3⤵
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1516
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45.1MB
MD52edcfcc1ffdbdfd1c2b31dfe573ccf88
SHA1ab36ffc11cf18d5b4df8ce531bc5bff639cd0a7f
SHA25622ddb03cc947756259473f69e151233610fb3cac1cd349d0bd5951ab06bb4a57
SHA512b57cc495ba5f9db6f768fa7c8bac1369a74c9dadfd977c99650867c9f6f5fdc6e8f5cb329893ec2332e0a84fc5b73232022a631935c61da27ba36111be1536ba