Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26/03/2025, 22:09
Static task
static1
Behavioral task
behavioral1
Sample
template letter to cancel service contract 10094.js
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
template letter to cancel service contract 10094.js
Resource
win10v2004-20250314-en
General
-
Target
template letter to cancel service contract 10094.js
-
Size
13.9MB
-
MD5
98ea723de2f4ce7c0ce6083bee82168c
-
SHA1
345780ed928b6b21b951a8c57fbd1daa21b86a0a
-
SHA256
5ab7c599252ac1c908edcbeb408e12c6398330a91bab4a21fc853731ecb4f7b1
-
SHA512
6fa08f38b7131080685ca7511db874e5a0a246ff2613f39aa31d9ee6f1d4cc1a43acc07b8725885aff70739791ebbd7485e8266f74cbfd9de0cdb7e641623ff0
-
SSDEEP
49152:hyd08dPXWR4ba/JOtdF5pHE2lsfiaahM3o43ORV59VDKtDwyd08dPXWR4ba/JOt4:1c43mvc43mvc43ml
Malware Config
Signatures
-
GootLoader
JavaScript loader known for delivering other families such as Gootkit and Cobaltstrike.
-
Gootloader family
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1796 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1796 powershell.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2752 wrote to memory of 2736 2752 taskeng.exe 32 PID 2752 wrote to memory of 2736 2752 taskeng.exe 32 PID 2752 wrote to memory of 2736 2752 taskeng.exe 32 PID 2736 wrote to memory of 2628 2736 wscript.EXE 33 PID 2736 wrote to memory of 2628 2736 wscript.EXE 33 PID 2736 wrote to memory of 2628 2736 wscript.EXE 33 PID 2628 wrote to memory of 1796 2628 cscript.exe 35 PID 2628 wrote to memory of 1796 2628 cscript.exe 35 PID 2628 wrote to memory of 1796 2628 cscript.exe 35 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\wscript.exewscript.exe "C:\Users\Admin\AppData\Local\Temp\template letter to cancel service contract 10094.js"1⤵PID:2248
-
C:\Windows\system32\taskeng.exetaskeng.exe {3FC3D001-0E76-4159-A1AC-7EEB507A0B9F} S-1-5-21-3290804112-2823094203-3137964600-1000:VORHPBAB\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\system32\wscript.EXEC:\Windows\system32\wscript.EXE BRITIS~1.JS2⤵
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\System32\cscript.exe"C:\Windows\System32\cscript.exe" "BRITIS~1.JS"3⤵
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1796
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39.9MB
MD57f38f78a529c806e29905ed425f87f3a
SHA1d838b1902f30a973905b1d7e89b1b300daa9abaa
SHA25603f6cd790090de091c69dc208a927126e6ef13a0293aa5f3c2896b89dbbd2558
SHA512fc89c0acc45ae7de5ef40482cbe12d12fb0dddb0d010ef741ea88b34fd0a98e0008ef3dd7d53c46a01a3dab13f7020d9d92a253e5d3d43b910224a87f1667c46