Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
13-01-2021 06:48
Static task
static1
Behavioral task
behavioral1
Sample
1.js
Resource
win7v20201028
Behavioral task
behavioral2
Sample
1.js
Resource
win10v20201028
General
-
Target
1.js
-
Size
664KB
-
MD5
069e5d7ddc53d96d7320b821537781f7
-
SHA1
af4116b7136d4cbf37a1a9351958c574348b23e0
-
SHA256
84e1944968103d32993f8f4b66f8c64a0c11a830242dd79b11b11436945fbde1
-
SHA512
ee35a4b22cd17363e27e60b5ba259971d1f4d0f5089a03017156a33f841d908e52e6974814d278b7987e46877c3ad4228a33a029445bc38906e2add22de9d3f8
Malware Config
Signatures
-
Blocklisted process makes network request 21 IoCs
Processes:
wscript.exeflow pid process 7 3480 wscript.exe 10 3480 wscript.exe 17 3480 wscript.exe 21 3480 wscript.exe 22 3480 wscript.exe 23 3480 wscript.exe 24 3480 wscript.exe 25 3480 wscript.exe 26 3480 wscript.exe 27 3480 wscript.exe 28 3480 wscript.exe 29 3480 wscript.exe 30 3480 wscript.exe 31 3480 wscript.exe 32 3480 wscript.exe 33 3480 wscript.exe 34 3480 wscript.exe 35 3480 wscript.exe 36 3480 wscript.exe 37 3480 wscript.exe 38 3480 wscript.exe -
Drops startup file 2 IoCs
Processes:
wscript.exewscript.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\1.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\1.js wscript.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
wscript.exewscript.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\1 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\1.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run\1 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\1.js\"" wscript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\1 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\1.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run\1 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\1.js\"" wscript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe -
JavaScript code in executable 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\1.js js C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\1.js js -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 6 ip-api.com -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
wscript.exedescription pid process target process PID 4760 wrote to memory of 3480 4760 wscript.exe wscript.exe PID 4760 wrote to memory of 3480 4760 wscript.exe wscript.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\1.js1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\1.js"2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
PID:3480
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\1.jsMD5
069e5d7ddc53d96d7320b821537781f7
SHA1af4116b7136d4cbf37a1a9351958c574348b23e0
SHA25684e1944968103d32993f8f4b66f8c64a0c11a830242dd79b11b11436945fbde1
SHA512ee35a4b22cd17363e27e60b5ba259971d1f4d0f5089a03017156a33f841d908e52e6974814d278b7987e46877c3ad4228a33a029445bc38906e2add22de9d3f8
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\1.jsMD5
069e5d7ddc53d96d7320b821537781f7
SHA1af4116b7136d4cbf37a1a9351958c574348b23e0
SHA25684e1944968103d32993f8f4b66f8c64a0c11a830242dd79b11b11436945fbde1
SHA512ee35a4b22cd17363e27e60b5ba259971d1f4d0f5089a03017156a33f841d908e52e6974814d278b7987e46877c3ad4228a33a029445bc38906e2add22de9d3f8
-
memory/3480-2-0x0000000000000000-mapping.dmp