Analysis
-
max time kernel
151s -
max time network
149s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
13-01-2021 06:48
Static task
static1
Behavioral task
behavioral1
Sample
1.js
Resource
win7v20201028
Behavioral task
behavioral2
Sample
1.js
Resource
win10v20201028
General
-
Target
1.js
-
Size
664KB
-
MD5
069e5d7ddc53d96d7320b821537781f7
-
SHA1
af4116b7136d4cbf37a1a9351958c574348b23e0
-
SHA256
84e1944968103d32993f8f4b66f8c64a0c11a830242dd79b11b11436945fbde1
-
SHA512
ee35a4b22cd17363e27e60b5ba259971d1f4d0f5089a03017156a33f841d908e52e6974814d278b7987e46877c3ad4228a33a029445bc38906e2add22de9d3f8
Malware Config
Signatures
-
Blocklisted process makes network request 20 IoCs
Processes:
wscript.exeflow pid process 7 1284 wscript.exe 9 1284 wscript.exe 10 1284 wscript.exe 11 1284 wscript.exe 13 1284 wscript.exe 14 1284 wscript.exe 15 1284 wscript.exe 17 1284 wscript.exe 18 1284 wscript.exe 19 1284 wscript.exe 21 1284 wscript.exe 22 1284 wscript.exe 23 1284 wscript.exe 25 1284 wscript.exe 26 1284 wscript.exe 27 1284 wscript.exe 29 1284 wscript.exe 30 1284 wscript.exe 31 1284 wscript.exe 33 1284 wscript.exe -
Drops startup file 2 IoCs
Processes:
wscript.exewscript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\1.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\1.js wscript.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
wscript.exewscript.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\1 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\1.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Windows\CurrentVersion\Run\1 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\1.js\"" wscript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\1 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\1.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Windows\CurrentVersion\Run\1 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\1.js\"" wscript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe -
JavaScript code in executable 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\1.js js C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\1.js js -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 6 ip-api.com -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
wscript.exedescription pid process target process PID 808 wrote to memory of 1284 808 wscript.exe wscript.exe PID 808 wrote to memory of 1284 808 wscript.exe wscript.exe PID 808 wrote to memory of 1284 808 wscript.exe wscript.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\1.js1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\1.js"2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
PID:1284
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
069e5d7ddc53d96d7320b821537781f7
SHA1af4116b7136d4cbf37a1a9351958c574348b23e0
SHA25684e1944968103d32993f8f4b66f8c64a0c11a830242dd79b11b11436945fbde1
SHA512ee35a4b22cd17363e27e60b5ba259971d1f4d0f5089a03017156a33f841d908e52e6974814d278b7987e46877c3ad4228a33a029445bc38906e2add22de9d3f8
-
MD5
069e5d7ddc53d96d7320b821537781f7
SHA1af4116b7136d4cbf37a1a9351958c574348b23e0
SHA25684e1944968103d32993f8f4b66f8c64a0c11a830242dd79b11b11436945fbde1
SHA512ee35a4b22cd17363e27e60b5ba259971d1f4d0f5089a03017156a33f841d908e52e6974814d278b7987e46877c3ad4228a33a029445bc38906e2add22de9d3f8