Analysis
-
max time kernel
151s -
max time network
145s -
platform
windows7_x64 -
resource
win7-en -
submitted
06-09-2021 12:31
Static task
static1
Behavioral task
behavioral1
Sample
lqxlQsUjTm_ee dropper 2.js
Resource
win7-en
Behavioral task
behavioral2
Sample
lqxlQsUjTm_ee dropper 2.js
Resource
win10v20210408
General
-
Target
lqxlQsUjTm_ee dropper 2.js
-
Size
27KB
-
MD5
3bd9840766e032536ab43c4f67b61a68
-
SHA1
10fcf2f0180c44c9b1fdd966b7e35658fce7fc11
-
SHA256
42f9f906a9e934e2680f95dd68204fef725c9827148bef6549581a542804062d
-
SHA512
1cd2b4a23ae9288f6ea758636bb80f65a8b37656754997f7b28c13c13dd60fde9e457d8c94c931ad4c9017bde8cbaa9142c2c2f287e76678f807386e7ee0056d
Malware Config
Signatures
-
Blocklisted process makes network request 22 IoCs
Processes:
wscript.exewscript.exeflow pid process 8 1728 wscript.exe 9 1728 wscript.exe 10 1728 wscript.exe 12 1728 wscript.exe 13 1728 wscript.exe 14 1728 wscript.exe 18 1316 wscript.exe 19 1316 wscript.exe 20 1316 wscript.exe 21 1316 wscript.exe 22 1728 wscript.exe 23 1728 wscript.exe 24 1728 wscript.exe 26 1728 wscript.exe 27 1728 wscript.exe 28 1728 wscript.exe 30 1728 wscript.exe 31 1728 wscript.exe 32 1728 wscript.exe 34 1728 wscript.exe 35 1728 wscript.exe 36 1728 wscript.exe -
Drops startup file 2 IoCs
Processes:
wscript.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\eDiHmfNYxg.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\eDiHmfNYxg.js wscript.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
wscript.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\Software\Microsoft\Windows\CurrentVersion\Run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\Software\Microsoft\Windows\CurrentVersion\Run\SEJOKAOI5S = "\"C:\\Users\\Admin\\AppData\\Roaming\\eDiHmfNYxg.js\"" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
wscript.exedescription pid process target process PID 1316 wrote to memory of 1728 1316 wscript.exe wscript.exe PID 1316 wrote to memory of 1728 1316 wscript.exe wscript.exe PID 1316 wrote to memory of 1728 1316 wscript.exe wscript.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe "C:\Users\Admin\AppData\Local\Temp\lqxlQsUjTm_ee dropper 2.js"1⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\eDiHmfNYxg.js"2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
PID:1728
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
d7e5462c55ac8273386ec5bba1715087
SHA1c2cb83079f6df06bf989c567381520ff5e53f4d1
SHA2566645dbe635a1f10e0f05bbebf2d58247f47e1719833a251311a67d3a5c64e2da
SHA512f8bc2e5c86322f472472fff55d5014939641d5850b4b6ce69993b50dbf219dc408a56e840ad6f79de1cdbad8eb5df2642b53aae02cc3fd574e5563e8af43685e