Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7-en -
submitted
09-09-2021 08:24
Static task
static1
Behavioral task
behavioral1
Sample
ISO_certification_031.js
Resource
win7-en
Behavioral task
behavioral2
Sample
ISO_certification_031.js
Resource
win10v20210408
General
-
Target
ISO_certification_031.js
-
Size
29KB
-
MD5
d2178ac6735106853e78e3be9c4bfc9f
-
SHA1
1f7b9f867b125ac0ff038ac6d5700ed926ee1958
-
SHA256
19c6e4d4e87bb5ad1cf9ba1bcdf7d61e64c54fef37c4a49bfea13981887602b6
-
SHA512
500ef99a869d76f0ba719ed128592bc59afc221f0900aee96ca5421c1aeecb919a0a260117b544662b78a3f59fffea651bcbc9271e39f017a10a38799d985989
Malware Config
Signatures
-
Blocklisted process makes network request 19 IoCs
Processes:
wscript.exewscript.exeflow pid process 12 1664 wscript.exe 13 1748 wscript.exe 14 1748 wscript.exe 17 1748 wscript.exe 19 1664 wscript.exe 21 1748 wscript.exe 23 1748 wscript.exe 25 1748 wscript.exe 27 1664 wscript.exe 28 1748 wscript.exe 31 1748 wscript.exe 34 1748 wscript.exe 35 1664 wscript.exe 38 1748 wscript.exe 39 1748 wscript.exe 41 1664 wscript.exe 43 1748 wscript.exe 46 1748 wscript.exe 47 1664 wscript.exe -
Drops startup file 3 IoCs
Processes:
wscript.exewscript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ISO_certification_031.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\KkRPkfLPdt.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\KkRPkfLPdt.js wscript.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
wscript.exewscript.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\Software\Microsoft\Windows\CurrentVersion\Run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\Software\Microsoft\Windows\CurrentVersion\Run\SEJOKAOI5S = "\"C:\\Users\\Admin\\AppData\\Roaming\\KkRPkfLPdt.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\Software\Microsoft\Windows\CurrentVersion\Run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\Software\Microsoft\Windows\CurrentVersion\Run\P7EKOWB6GH = "\"C:\\ProgramData\\ISO_certification_031.js\"" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
wscript.exedescription pid process target process PID 1664 wrote to memory of 1748 1664 wscript.exe wscript.exe PID 1664 wrote to memory of 1748 1664 wscript.exe wscript.exe PID 1664 wrote to memory of 1748 1664 wscript.exe wscript.exe PID 1664 wrote to memory of 1532 1664 wscript.exe schtasks.exe PID 1664 wrote to memory of 1532 1664 wscript.exe schtasks.exe PID 1664 wrote to memory of 1532 1664 wscript.exe schtasks.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\ISO_certification_031.js1⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\KkRPkfLPdt.js"2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
PID:1748 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\ProgramData\ISO_certification_031.js2⤵
- Creates scheduled task(s)
PID:1532
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
3176c62db4cb87f70fe7e34817fc04b1
SHA1856f188830c46960531dc8d47a2dec6c2458ff24
SHA2566b3c57a6526de6f9e1f5619142aaa1e0e9a731c88c5f72f940a0c17be66bced8
SHA51261b87b3ceb4fcc72fad58ba23950eeca8348b638e8d50c0dee44f2588d5966a3b772a80cffbe7bb56d25cdb21446d3d6ecf412f28e104d82709beb298679c4ed