Analysis
-
max time kernel
1181s -
max time network
1204s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
21-09-2021 18:26
Static task
static1
Behavioral task
behavioral1
Sample
TWR200719A.js
Resource
win7-en-20210920
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
TWR200719A.js
Resource
win10v20210408
0 signatures
0 seconds
General
-
Target
TWR200719A.js
-
Size
9KB
-
MD5
3787cf61efad8ad8206ecf4646591523
-
SHA1
a4f5b2f8d95daf74ebb7fd69daa9db8d664d3d42
-
SHA256
d6c370036f27ac2a4b7a3c03dab8cba588d665197ba22391bb7ce8d049948d31
-
SHA512
d0f9885a76ced02d7d5b9b2a1ea4ee0cf9b9e3f178bf8495dae31c5adeb79818a00548eab73c4fe78b40468ad8bd75c13305e42b3aa8bf28c68356e3b4b9f27b
Score
10/10
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
Processes:
wscript.exeflow pid process 3 768 wscript.exe -
Drops startup file 2 IoCs
Processes:
wscript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TWR200719A.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TWR200719A.js wscript.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
wscript.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Windows\CurrentVersion\Run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Windows\CurrentVersion\Run\JVEJAV8OP1 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\TWR200719A.js\"" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
wscript.exedescription pid process target process PID 768 wrote to memory of 368 768 wscript.exe schtasks.exe PID 768 wrote to memory of 368 768 wscript.exe schtasks.exe PID 768 wrote to memory of 368 768 wscript.exe schtasks.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\TWR200719A.js1⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Local\Temp\TWR200719A.js2⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/368-53-0x0000000000000000-mapping.dmp