Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
18-12-2021 08:48
Static task
static1
Behavioral task
behavioral1
Sample
IMG-17122021.js
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
IMG-17122021.js
Resource
win10-en-20211208
General
-
Target
IMG-17122021.js
-
Size
444KB
-
MD5
0df3a8c017448979574150a7ec49268d
-
SHA1
075ed41bbf2157cb4d1bfb64ad4029b30749294f
-
SHA256
796e03ed9e5304d0a2bc4855b89282b0fe9f4522df8e27a3923e26e13e1e257d
-
SHA512
a857399bea5264f8673ae9970ffea02402828b549b57e4f38fd50e8d5aa03d0c5d26f2e5ae72e98cc3cbf2a00d9da34587eed020a51f8989b88c18536360a48c
Malware Config
Signatures
-
Blocklisted process makes network request 36 IoCs
Processes:
wscript.exewscript.exeflow pid process 12 692 wscript.exe 13 3868 wscript.exe 22 3868 wscript.exe 23 692 wscript.exe 26 3868 wscript.exe 27 692 wscript.exe 30 3868 wscript.exe 31 692 wscript.exe 32 3868 wscript.exe 33 692 wscript.exe 34 3868 wscript.exe 35 692 wscript.exe 36 3868 wscript.exe 37 692 wscript.exe 38 3868 wscript.exe 40 692 wscript.exe 41 3868 wscript.exe 42 692 wscript.exe 43 3868 wscript.exe 44 692 wscript.exe 45 3868 wscript.exe 46 692 wscript.exe 47 3868 wscript.exe 48 692 wscript.exe 49 3868 wscript.exe 50 692 wscript.exe 51 3868 wscript.exe 52 692 wscript.exe 53 3868 wscript.exe 54 692 wscript.exe 55 3868 wscript.exe 56 692 wscript.exe 57 3868 wscript.exe 58 692 wscript.exe 59 3868 wscript.exe 60 692 wscript.exe -
Drops startup file 4 IoCs
Processes:
wscript.exewscript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG-17122021.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG-17122021.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\xFozEXCjGc.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\xFozEXCjGc.js wscript.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
wscript.exewscript.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Windows\CurrentVersion\Run\R4J2SBXQ4G = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\IMG-17122021.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Windows\CurrentVersion\Run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Windows\CurrentVersion\Run\SEJOKAOI5S = "\"C:\\Users\\Admin\\AppData\\Roaming\\xFozEXCjGc.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Windows\CurrentVersion\Run wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
wscript.exedescription pid process target process PID 692 wrote to memory of 3868 692 wscript.exe wscript.exe PID 692 wrote to memory of 3868 692 wscript.exe wscript.exe PID 692 wrote to memory of 2368 692 wscript.exe schtasks.exe PID 692 wrote to memory of 2368 692 wscript.exe schtasks.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\IMG-17122021.js1⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:692 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\xFozEXCjGc.js"2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
PID:3868
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Local\Temp\IMG-17122021.js2⤵
- Creates scheduled task(s)
PID:2368
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
748521dc9913de2bebe7976db27ebbd4
SHA158d521b95cc87fe0b66301a405a3b7d05ec9c452
SHA25649829dd56456af8482b5da5491fefcf10e556d3240644447d68d3d29c8b93b2f
SHA512578d71c9d32a689466918ee940f0f8e3da95b7dea431e4ec70a1974be587996d74523bc55d36bf72fa1f604ec9995c696826a1c516fc5e3bf1807eecbc1b87bf