Analysis
-
max time kernel
154s -
max time network
145s -
platform
windows10_x64 -
resource
win10-en-20211104 -
submitted
02-12-2021 16:29
Static task
static1
Behavioral task
behavioral1
Sample
PO202104-114.js
Resource
win7-en-20211104
Behavioral task
behavioral2
Sample
PO202104-114.js
Resource
win10-en-20211104
General
-
Target
PO202104-114.js
-
Size
202KB
-
MD5
5c4f47782fb4bfdeb29d59b6c9650286
-
SHA1
62300fcfeaa7b749cfd7850b94024f362189af11
-
SHA256
2e0f76b60d0374094c685eca1e37895a7307df72ab16d4bb552911a21b6a36cd
-
SHA512
b699e44ceaf19ceab872eb7c743a0492eacc2ebb515906b7d5d28767159b14fc18adabd56f1bcb07fd1bcd169a3d1f74cab59ad8ee7643741796639103dce7b5
Malware Config
Signatures
-
Blocklisted process makes network request 5 IoCs
Processes:
WScript.exeflow pid process 9 3968 WScript.exe 14 3968 WScript.exe 32 3968 WScript.exe 33 3968 WScript.exe 36 3968 WScript.exe -
Drops startup file 2 IoCs
Processes:
WScript.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SyGGrZamCM.js WScript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SyGGrZamCM.js WScript.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
WScript.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Windows\CurrentVersion\Run WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Windows\CurrentVersion\Run\SEJOKAOI5S = "\"C:\\Users\\Admin\\AppData\\Roaming\\SyGGrZamCM.js\"" WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
Processes:
wscript.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000_Classes\Local Settings wscript.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
wscript.exedescription pid process target process PID 3760 wrote to memory of 3968 3760 wscript.exe WScript.exe PID 3760 wrote to memory of 3968 3760 wscript.exe WScript.exe PID 3760 wrote to memory of 4240 3760 wscript.exe javaw.exe PID 3760 wrote to memory of 4240 3760 wscript.exe javaw.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\PO202104-114.js1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\SyGGrZamCM.js"2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
PID:3968
-
-
C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe"C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\zyhpyeicn.txt"2⤵PID:4240
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
78802968268e71d56dc91944257cc6e7
SHA1e31ef27fe37c56c4a1e6eb37753b86b68f0ef387
SHA256b867cf607f7cb4fcd25ecdaf5af06cf04d9af5f75fd407f1b90d4d881cd384df
SHA51232e214e864ded5c299d6f9864347e3d8df1719cc538903715bdc0281de90e738daacba9962d85cf950fc0e079f7b50c4b5adaffde6d12a37790e66d3da7b5afa
-
MD5
e5c57969a139fa14269758cb8cc8f9a7
SHA1432f65c2b1da28b421eac3956d8cefd72f04ae6a
SHA256b2b661ff89ba10a5a27a06df63a9ffd158b254aff5f38a96ff5c1f6344959501
SHA512526f7f1717488c87457353d78480ec590d5abf5bf6bdc697dc92433c26a949c649b94bd83cfc7891c24fbc5e96414793fb9a192f77a3ded9ad434d8524a215d5