Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    13-01-2021 06:45

General

  • Target

    PaymentDetails#765.js

  • Size

    240KB

  • MD5

    74bccd5892c45290559b623d0f9f628f

  • SHA1

    4b2d9066f1542453af9f37bc421684e7a6eec255

  • SHA256

    3ac7b7be256ed723792c50d44eb38da6207993463f7e7a5b1c3788ada0567d2e

  • SHA512

    2ab01e3d379194e4d7f86ce2d973e827ccbe0f680d023ba2bbbe4b70cb06268ca5a9a50166616ca99822d84e9fb244976f758e00e56f48c45d1931f8267384c2

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 38 IoCs
  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\PaymentDetails#765.js
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1080
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\PaymentDetails#765.js"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      • Adds Run key to start application
      PID:2008

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PaymentDetails#765.js

    MD5

    74bccd5892c45290559b623d0f9f628f

    SHA1

    4b2d9066f1542453af9f37bc421684e7a6eec255

    SHA256

    3ac7b7be256ed723792c50d44eb38da6207993463f7e7a5b1c3788ada0567d2e

    SHA512

    2ab01e3d379194e4d7f86ce2d973e827ccbe0f680d023ba2bbbe4b70cb06268ca5a9a50166616ca99822d84e9fb244976f758e00e56f48c45d1931f8267384c2

  • C:\Users\Admin\AppData\Roaming\PaymentDetails#765.js

    MD5

    74bccd5892c45290559b623d0f9f628f

    SHA1

    4b2d9066f1542453af9f37bc421684e7a6eec255

    SHA256

    3ac7b7be256ed723792c50d44eb38da6207993463f7e7a5b1c3788ada0567d2e

    SHA512

    2ab01e3d379194e4d7f86ce2d973e827ccbe0f680d023ba2bbbe4b70cb06268ca5a9a50166616ca99822d84e9fb244976f758e00e56f48c45d1931f8267384c2

  • memory/396-6-0x000007FEF8040000-0x000007FEF82BA000-memory.dmp

    Filesize

    2.5MB

  • memory/1080-4-0x00000000024E0000-0x00000000024E4000-memory.dmp

    Filesize

    16KB

  • memory/2008-2-0x0000000000000000-mapping.dmp