Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10_x64 -
resource
win10-en-20211104 -
submitted
02-12-2021 17:25
Static task
static1
Behavioral task
behavioral1
Sample
js-decoded-1.js
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
js-decoded-1.js
Resource
win10-en-20211104
General
-
Target
js-decoded-1.js
-
Size
19KB
-
MD5
38eef142a1b030c810b6f18bc1a6ae7a
-
SHA1
2d2ffe145c88bf1df437ae37b157f8eda7d9265e
-
SHA256
7953ed1095e83bed7ad65ef426e2119e47bcac5a65d6111aef8576d301df9797
-
SHA512
34c02223bae60c789d6417e541008de777f3a86aad8ff4ebe010ca6cc693f95e3b5641511832ea043efe5b6d3f71e14c78c36146a91d9892f973c10602c49ef8
Malware Config
Signatures
-
Blocklisted process makes network request 37 IoCs
Processes:
wscript.exewscript.exeflow pid process 11 3760 wscript.exe 12 3960 wscript.exe 16 3960 wscript.exe 17 3760 wscript.exe 22 3960 wscript.exe 23 3760 wscript.exe 27 3960 wscript.exe 28 3760 wscript.exe 35 3960 wscript.exe 36 3760 wscript.exe 39 3960 wscript.exe 40 3760 wscript.exe 43 3960 wscript.exe 44 3760 wscript.exe 45 3960 wscript.exe 46 3760 wscript.exe 49 3960 wscript.exe 50 3760 wscript.exe 51 3960 wscript.exe 52 3760 wscript.exe 53 3960 wscript.exe 54 3760 wscript.exe 55 3960 wscript.exe 56 3760 wscript.exe 57 3960 wscript.exe 58 3760 wscript.exe 59 3960 wscript.exe 60 3760 wscript.exe 61 3960 wscript.exe 62 3760 wscript.exe 63 3960 wscript.exe 64 3760 wscript.exe 65 3960 wscript.exe 66 3760 wscript.exe 67 3960 wscript.exe 68 3760 wscript.exe 69 3960 wscript.exe -
Drops startup file 3 IoCs
Processes:
wscript.exewscript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\js-decoded-1.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RRXVpOavDl.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RRXVpOavDl.js wscript.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
wscript.exewscript.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Windows\CurrentVersion\Run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Windows\CurrentVersion\Run\SEJOKAOI5S = "\"C:\\Users\\Admin\\AppData\\Roaming\\RRXVpOavDl.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Windows\CurrentVersion\Run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Windows\CurrentVersion\Run\0WENLYRIM2 = "\"C:\\Users\\Admin\\AppData\\Roaming\\js-decoded-1.js\"" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
wscript.exedescription pid process target process PID 3760 wrote to memory of 3960 3760 wscript.exe wscript.exe PID 3760 wrote to memory of 3960 3760 wscript.exe wscript.exe PID 3760 wrote to memory of 512 3760 wscript.exe schtasks.exe PID 3760 wrote to memory of 512 3760 wscript.exe schtasks.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\js-decoded-1.js1⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\RRXVpOavDl.js"2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
PID:3960
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\js-decoded-1.js2⤵
- Creates scheduled task(s)
PID:512
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
dfdc9c79b321d87cc8dcbb361a69ecb5
SHA17d430e4ef2ecaf4db5e42789a56b2ea4e280b35c
SHA256f99f5c043620cf790857f1a2c8906a9323c57a5b6fa6a59acd571eb1bfc68328
SHA5124856afcf1953a9056253af8baa39b6d9283aa17153903c3c671785e51ac2ccf7aa104fac5e4c2fb4098d1f1ed6a9c9212cfe2ebbbbe6f46fc53ebec96537705f