Analysis
-
max time kernel
137s -
max time network
146s -
platform
windows7_x64 -
resource
win7-en-20211014 -
submitted
29-11-2021 19:58
Static task
static1
Behavioral task
behavioral1
Sample
Accounts and ballance sheet.js
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
Accounts and ballance sheet.js
Resource
win10-en-20211104
General
-
Target
Accounts and ballance sheet.js
-
Size
15KB
-
MD5
9ac803588c9ddeb2a51428af8907aa93
-
SHA1
87d12029311274b429087ccd9af0972ea6cb4ccd
-
SHA256
0d25ce06db15caf3281a0775da2d5b397b28c73dcde1edf6d33db66aebced6ae
-
SHA512
1ed5ff0dfd8c3f1d9d7b75ba07a65cda46af74105337d4704306967d0be30b9557f517f60fdda22b5dd9ed55c85ed7c70a556a0f9cb70effb7560803a4f786c0
Malware Config
Signatures
-
Blocklisted process makes network request 6 IoCs
Processes:
wscript.exeflow pid process 4 840 wscript.exe 5 840 wscript.exe 6 840 wscript.exe 7 840 wscript.exe 8 840 wscript.exe 9 840 wscript.exe -
Drops startup file 1 IoCs
Processes:
wscript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Accounts and ballance sheet.js wscript.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
wscript.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Windows\CurrentVersion\Run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Windows\CurrentVersion\Run\OLXYMEWHIE = "\"C:\\Users\\Admin\\AppData\\Local\\Accounts and ballance sheet.js\"" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs .reg file with regedit 1 IoCs
Processes:
regedit.exepid process 636 regedit.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
wscript.exedescription pid process target process PID 840 wrote to memory of 636 840 wscript.exe regedit.exe PID 840 wrote to memory of 636 840 wscript.exe regedit.exe PID 840 wrote to memory of 636 840 wscript.exe regedit.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe "C:\Users\Admin\AppData\Local\Temp\Accounts and ballance sheet.js"1⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Windows\regedit.exe"regedit.exe" "C:\Users\Admin\AppData\Local\Temp\ebgeaegdbdecaedfebace.reg"2⤵
- Runs .reg file with regedit
PID:636
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
0e5411d7ecba9a435afda71c6c39d8fd
SHA12d6812052bf7be1b5e213e1d813ae39faa07284c
SHA256cb68d50df5817e51ec5b2f72893dc4c749bf3504519107e0a78dda84d55f09e2
SHA512903ac6e5c8a12607af267b54bcbbedfa5542c5b4f7ea289ab7c6a32a424d5b846ae406d830cb4ad48e2b46f92c504163c0856af8c3e09685a8855f39f616ddb1