Analysis
-
max time kernel
137s -
max time network
149s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
13-01-2021 06:46
Static task
static1
Behavioral task
behavioral1
Sample
PO KVRQ-7436859-012.js
Resource
win7v20201028
Behavioral task
behavioral2
Sample
PO KVRQ-7436859-012.js
Resource
win10v20201028
General
-
Target
PO KVRQ-7436859-012.js
-
Size
179KB
-
MD5
869614f2b681a26d7f1ee690637ee9d2
-
SHA1
b31f9b66665e45e382d6f700153c735c67bdd82c
-
SHA256
6a00522a3bc04a45725e18ec41c81738d905fdf8b3c4859e86ee6a2a6d154b8f
-
SHA512
b6bc5022ff955226fbaa0cab40e6a012c2752febad87ce71a952ee5aad2900f334c3b10fa458055202a92589dfadf1c54a99669c216e85afd0388e2eae3c15bd
Malware Config
Signatures
-
Blocklisted process makes network request 7 IoCs
Processes:
wscript.exeflow pid process 6 1424 wscript.exe 8 1424 wscript.exe 11 1424 wscript.exe 12 1424 wscript.exe 14 1424 wscript.exe 15 1424 wscript.exe 16 1424 wscript.exe -
Drops startup file 2 IoCs
Processes:
wscript.exewscript.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PO KVRQ-7436859-012.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PO KVRQ-7436859-012.js wscript.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
wscript.exewscript.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\PO KVRQ-7436859-012 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\PO KVRQ-7436859-012.js\"" wscript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\PO KVRQ-7436859-012 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\PO KVRQ-7436859-012.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\PO KVRQ-7436859-012 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\PO KVRQ-7436859-012.js\"" wscript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\PO KVRQ-7436859-012 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\PO KVRQ-7436859-012.js\"" wscript.exe -
JavaScript code in executable 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\PO KVRQ-7436859-012.js js C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PO KVRQ-7436859-012.js js -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 5 ip-api.com -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
wscript.exedescription pid process target process PID 1904 wrote to memory of 1424 1904 wscript.exe wscript.exe PID 1904 wrote to memory of 1424 1904 wscript.exe wscript.exe PID 1904 wrote to memory of 1424 1904 wscript.exe wscript.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe "C:\Users\Admin\AppData\Local\Temp\PO KVRQ-7436859-012.js"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\PO KVRQ-7436859-012.js"2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
PID:1424
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
869614f2b681a26d7f1ee690637ee9d2
SHA1b31f9b66665e45e382d6f700153c735c67bdd82c
SHA2566a00522a3bc04a45725e18ec41c81738d905fdf8b3c4859e86ee6a2a6d154b8f
SHA512b6bc5022ff955226fbaa0cab40e6a012c2752febad87ce71a952ee5aad2900f334c3b10fa458055202a92589dfadf1c54a99669c216e85afd0388e2eae3c15bd
-
MD5
869614f2b681a26d7f1ee690637ee9d2
SHA1b31f9b66665e45e382d6f700153c735c67bdd82c
SHA2566a00522a3bc04a45725e18ec41c81738d905fdf8b3c4859e86ee6a2a6d154b8f
SHA512b6bc5022ff955226fbaa0cab40e6a012c2752febad87ce71a952ee5aad2900f334c3b10fa458055202a92589dfadf1c54a99669c216e85afd0388e2eae3c15bd