Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-en -
submitted
13-09-2021 16:02
Static task
static1
Behavioral task
behavioral1
Sample
PopDetailed.js
Resource
win7-en
Behavioral task
behavioral2
Sample
PopDetailed.js
Resource
win10-en
General
-
Target
PopDetailed.js
-
Size
28KB
-
MD5
c071fe68b4744fa5af4b3f316247d2f3
-
SHA1
0a24c9a107802e9580d6a897aaeb6461861b820e
-
SHA256
6183badb23d6b2673972d9faf76267226a83311238c7819c3f3732481f291221
-
SHA512
98e43088f1ab1e6841114e7be06639e357b2b1b69c3911c030db99176de6c9f84d055c6015bff75cf93d5f631e0585ea40e1fc35570f0e2676ebd473640330d8
Malware Config
Signatures
-
Blocklisted process makes network request 19 IoCs
Processes:
wscript.exewscript.exeflow pid process 12 1664 wscript.exe 13 1712 wscript.exe 14 1712 wscript.exe 15 1712 wscript.exe 18 1712 wscript.exe 19 1712 wscript.exe 20 1712 wscript.exe 22 1712 wscript.exe 23 1712 wscript.exe 24 1712 wscript.exe 27 1712 wscript.exe 28 1712 wscript.exe 30 1712 wscript.exe 32 1712 wscript.exe 33 1712 wscript.exe 34 1712 wscript.exe 36 1712 wscript.exe 37 1712 wscript.exe 38 1712 wscript.exe -
Drops startup file 2 IoCs
Processes:
wscript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UGjSbcFXKv.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UGjSbcFXKv.js wscript.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
wscript.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\Software\Microsoft\Windows\CurrentVersion\Run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\Software\Microsoft\Windows\CurrentVersion\Run\SEJOKAOI5S = "\"C:\\Users\\Admin\\AppData\\Roaming\\UGjSbcFXKv.js\"" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
wscript.exedescription pid process target process PID 1664 wrote to memory of 1712 1664 wscript.exe wscript.exe PID 1664 wrote to memory of 1712 1664 wscript.exe wscript.exe PID 1664 wrote to memory of 1712 1664 wscript.exe wscript.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\PopDetailed.js1⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\UGjSbcFXKv.js"2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
PID:1712
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
1a8aa0a13883c9b73b59b286c603e0aa
SHA1b5eb5660bc3543e26efef3ea3083d0b9fe6dc743
SHA2568213ce25f2b8a3f62a5610c286a60f8b5d2c310dc72681c7b1d20a9d4fc537d5
SHA5124fd1e61432713dc121ec8a522abdaa0e1e298212db348d87f1107b764ce1a093495055e5b3e7ab2e265c25f106bd9dd6bfb30ccfdd38ee4c476c8ee1a0298a38