Analysis
-
max time kernel
287s -
max time network
296s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
21-12-2021 19:38
Static task
static1
Behavioral task
behavioral1
Sample
ZXTEJDJGDMND.js
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
ZXTEJDJGDMND.js
Resource
win10-en-20211208
windows10_x64
0 signatures
0 seconds
General
-
Target
ZXTEJDJGDMND.js
-
Size
9KB
-
MD5
4bf6f13902c5c69baf11914cc4c6eb4c
-
SHA1
5fcb4b1f0092a79c2f050c678a69fbc6ee8e2852
-
SHA256
d1d87467831ba4b691160509772995bb99ce7d2abcc96bd6b6cdd6ec1af058dc
-
SHA512
1b3ecdf7dd4a8541c80d0fa51359228bdb10687715697cb1ceaea8e14d36db5f6f53425a3e5f065797faf2ff8ebdc7c9afe5e32a9149de1d81e79b68a10dbaa9
Score
10/10
Malware Config
Signatures
-
Blocklisted process makes network request 11 IoCs
Processes:
wscript.exeflow pid process 5 968 wscript.exe 6 968 wscript.exe 7 968 wscript.exe 9 968 wscript.exe 10 968 wscript.exe 11 968 wscript.exe 13 968 wscript.exe 14 968 wscript.exe 15 968 wscript.exe 17 968 wscript.exe 18 968 wscript.exe -
Drops startup file 2 IoCs
Processes:
wscript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ZXTEJDJGDMND.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ZXTEJDJGDMND.js wscript.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
wscript.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows\CurrentVersion\Run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows\CurrentVersion\Run\POXI8QWF6K = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\ZXTEJDJGDMND.js\"" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
wscript.exedescription pid process target process PID 968 wrote to memory of 916 968 wscript.exe schtasks.exe PID 968 wrote to memory of 916 968 wscript.exe schtasks.exe PID 968 wrote to memory of 916 968 wscript.exe schtasks.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\ZXTEJDJGDMND.js1⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Local\Temp\ZXTEJDJGDMND.js2⤵
- Creates scheduled task(s)
PID:916
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:1068