Analysis
-
max time kernel
139s -
max time network
174s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
29-07-2021 20:03
Static task
static1
Behavioral task
behavioral1
Sample
ORDER-21729.doc.js
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
General
-
Target
ORDER-21729.doc.js
-
Size
148KB
-
MD5
be1345c7e8039f7d3782a06a03361767
-
SHA1
21d422062fa6de71e94b529e67566477333df43f
-
SHA256
42cadce684f1b747fa31f2c109c2a729ca5d1baf4aed93f3c3f87fb8f7053deb
-
SHA512
54a486c8e832cedbadee557fd64f54493bf4ee7c5be2fe4f08a9c1a29f6663d1b91bddbf3038e306bf5060578617b7c6dd502f66e2444d7dc79e2da812a96da8
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
Processes:
wscript.exeflow pid process 6 1932 wscript.exe -
Drops startup file 2 IoCs
Processes:
wscript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ORDER-21729.doc.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ORDER-21729.doc.js wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.