Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10_x64 -
resource
win10-en -
submitted
09-09-2021 07:11
Static task
static1
Behavioral task
behavioral1
Sample
PO_2.js
Resource
win7-en
Behavioral task
behavioral2
Sample
PO_2.js
Resource
win10-en
General
-
Target
PO_2.js
-
Size
28KB
-
MD5
3f3198d63db83bc60c004f83498b12f0
-
SHA1
b0988bc21752a7b54011331cfe46a6f4feac94d5
-
SHA256
9d62554799063f4ec1418e23349d3dd4b4d4047cb4ccbb1cbb221d40b6f53c52
-
SHA512
c3ce8428e20acfbc0617c3daf8756a664415aed2f2305b29f9e6992ac9065517d54faead29803f395ad15eb338421b9737642a517c56d775bbf5b0e22e99bd46
Malware Config
Signatures
-
Blocklisted process makes network request 18 IoCs
Processes:
wscript.exewscript.exeflow pid process 8 3264 wscript.exe 9 1208 wscript.exe 17 1208 wscript.exe 19 1208 wscript.exe 20 1208 wscript.exe 21 1208 wscript.exe 22 1208 wscript.exe 23 1208 wscript.exe 24 1208 wscript.exe 25 1208 wscript.exe 26 1208 wscript.exe 27 1208 wscript.exe 28 1208 wscript.exe 29 1208 wscript.exe 30 1208 wscript.exe 31 1208 wscript.exe 32 1208 wscript.exe 33 1208 wscript.exe -
Drops startup file 2 IoCs
Processes:
wscript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ddNfJQtkil.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ddNfJQtkil.js wscript.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
wscript.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000\Software\Microsoft\Windows\CurrentVersion\Run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000\Software\Microsoft\Windows\CurrentVersion\Run\SEJOKAOI5S = "\"C:\\Users\\Admin\\AppData\\Roaming\\ddNfJQtkil.js\"" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
wscript.exedescription pid process target process PID 3264 wrote to memory of 1208 3264 wscript.exe wscript.exe PID 3264 wrote to memory of 1208 3264 wscript.exe wscript.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\PO_2.js1⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
PID:3264 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\ddNfJQtkil.js"2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
PID:1208
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
c3cfe504e21afdb07e267d92cb98fd00
SHA119c693828808b30d3113a5d1cf718de4e491db11
SHA2562116d704374f205d704acfadf3ddb3d488553f01267f692b350e695e134d9c59
SHA5127db16e0686d65f2cd22c47c5e856d744e9b7c51b513e9adf88f4072f0051279d5b8de221c9ba1c3dbf1f4ccaa255ca240ff61aacf1704e629b9dd6f0c305e76b