Analysis
-
max time kernel
149s -
max time network
164s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
06-09-2021 12:31
Static task
static1
Behavioral task
behavioral1
Sample
lqxlQsUjTm_ee dropper 2.js
Resource
win7-en
Behavioral task
behavioral2
Sample
lqxlQsUjTm_ee dropper 2.js
Resource
win10v20210408
General
-
Target
lqxlQsUjTm_ee dropper 2.js
-
Size
27KB
-
MD5
3bd9840766e032536ab43c4f67b61a68
-
SHA1
10fcf2f0180c44c9b1fdd966b7e35658fce7fc11
-
SHA256
42f9f906a9e934e2680f95dd68204fef725c9827148bef6549581a542804062d
-
SHA512
1cd2b4a23ae9288f6ea758636bb80f65a8b37656754997f7b28c13c13dd60fde9e457d8c94c931ad4c9017bde8cbaa9142c2c2f287e76678f807386e7ee0056d
Malware Config
Signatures
-
Blocklisted process makes network request 21 IoCs
Processes:
wscript.exewscript.exeflow pid process 8 492 wscript.exe 15 492 wscript.exe 18 492 wscript.exe 19 492 wscript.exe 20 492 wscript.exe 21 492 wscript.exe 22 492 wscript.exe 24 992 wscript.exe 26 992 wscript.exe 27 492 wscript.exe 28 492 wscript.exe 29 492 wscript.exe 30 492 wscript.exe 31 492 wscript.exe 32 492 wscript.exe 33 492 wscript.exe 34 492 wscript.exe 35 492 wscript.exe 36 492 wscript.exe 37 492 wscript.exe 38 492 wscript.exe -
Drops startup file 2 IoCs
Processes:
wscript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\eDiHmfNYxg.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\eDiHmfNYxg.js wscript.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
wscript.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\SEJOKAOI5S = "\"C:\\Users\\Admin\\AppData\\Roaming\\eDiHmfNYxg.js\"" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
wscript.exedescription pid process target process PID 992 wrote to memory of 492 992 wscript.exe wscript.exe PID 992 wrote to memory of 492 992 wscript.exe wscript.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe "C:\Users\Admin\AppData\Local\Temp\lqxlQsUjTm_ee dropper 2.js"1⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
PID:992 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\eDiHmfNYxg.js"2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
PID:492
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
d7e5462c55ac8273386ec5bba1715087
SHA1c2cb83079f6df06bf989c567381520ff5e53f4d1
SHA2566645dbe635a1f10e0f05bbebf2d58247f47e1719833a251311a67d3a5c64e2da
SHA512f8bc2e5c86322f472472fff55d5014939641d5850b4b6ce69993b50dbf219dc408a56e840ad6f79de1cdbad8eb5df2642b53aae02cc3fd574e5563e8af43685e