Analysis
-
max time kernel
151s -
max time network
147s -
platform
windows10_x64 -
resource
win10-en -
submitted
01-09-2021 19:13
Static task
static1
Behavioral task
behavioral1
Sample
js-decoded-1.js
Resource
win7-en
Behavioral task
behavioral2
Sample
js-decoded-1.js
Resource
win10-en
General
-
Target
js-decoded-1.js
-
Size
18KB
-
MD5
d2b0ad1aa51305128fc15a0596dd1c83
-
SHA1
ab34fadd92aa205ea9a9129601f914cb6da24946
-
SHA256
198c52fa986d2d7e55ef994346b440e56a25d2ed329ed425139e728fd36bc1ef
-
SHA512
dd0eec9a7cb5bedf1c3252098c4b835d9665ed1a8c8e770d401f9ef2d600db560fd94fe66087a22b549213dd535c02ed1c788a6608defdde815b53380622063c
Malware Config
Signatures
-
Blocklisted process makes network request 36 IoCs
Processes:
wscript.exewscript.exeflow pid process 10 4000 wscript.exe 11 1408 wscript.exe 18 4000 wscript.exe 19 1408 wscript.exe 21 4000 wscript.exe 22 1408 wscript.exe 23 4000 wscript.exe 24 1408 wscript.exe 25 4000 wscript.exe 26 1408 wscript.exe 27 4000 wscript.exe 28 1408 wscript.exe 29 4000 wscript.exe 30 1408 wscript.exe 31 1408 wscript.exe 32 4000 wscript.exe 33 4000 wscript.exe 34 1408 wscript.exe 35 4000 wscript.exe 36 1408 wscript.exe 37 4000 wscript.exe 38 1408 wscript.exe 39 4000 wscript.exe 40 1408 wscript.exe 41 4000 wscript.exe 42 4000 wscript.exe 43 1408 wscript.exe 44 4000 wscript.exe 45 1408 wscript.exe 46 4000 wscript.exe 47 1408 wscript.exe 48 4000 wscript.exe 49 1408 wscript.exe 50 4000 wscript.exe 51 1408 wscript.exe 52 4000 wscript.exe -
Drops startup file 3 IoCs
Processes:
wscript.exewscript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\js-decoded-1.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\yyUgEcLmud.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\yyUgEcLmud.js wscript.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
wscript.exewscript.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000\Software\Microsoft\Windows\CurrentVersion\Run\SEJOKAOI5S = "\"C:\\Users\\Admin\\AppData\\Roaming\\yyUgEcLmud.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000\Software\Microsoft\Windows\CurrentVersion\Run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000\Software\Microsoft\Windows\CurrentVersion\Run\P7EKOWB6GH = "\"C:\\ProgramData\\js-decoded-1.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000\Software\Microsoft\Windows\CurrentVersion\Run wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
wscript.exedescription pid process target process PID 4000 wrote to memory of 1408 4000 wscript.exe wscript.exe PID 4000 wrote to memory of 1408 4000 wscript.exe wscript.exe PID 4000 wrote to memory of 2376 4000 wscript.exe schtasks.exe PID 4000 wrote to memory of 2376 4000 wscript.exe schtasks.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\js-decoded-1.js1⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\yyUgEcLmud.js"2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\ProgramData\js-decoded-1.js2⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\yyUgEcLmud.jsMD5
65363d0ea259acee31709e3e7a45cab8
SHA110143fc1636eb68c01f5fd6b39244dbd393c66e9
SHA25686177bfcebdc7ae4a3d049399710ff6272f8289160c068465d729e7cff80f4c7
SHA5126eb5e93b6a6be0e0c9aecbb4f356e188c41a475a926ef1de5329bfbb80509ab4dbbafd219027ea42e89ae4d355740277820a5e20c0dae5cb27d00e2f00ee070f
-
memory/1408-115-0x0000000000000000-mapping.dmp
-
memory/2376-117-0x0000000000000000-mapping.dmp