Analysis
-
max time kernel
122s -
max time network
121s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
01-02-2022 05:42
Static task
static1
Behavioral task
behavioral1
Sample
7460accf81db3640d5f7e1e7b430431adfd687918983e78ecc12a0308f95ec47.js
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
7460accf81db3640d5f7e1e7b430431adfd687918983e78ecc12a0308f95ec47.js
Resource
win10v2004-en-20220113
General
-
Target
7460accf81db3640d5f7e1e7b430431adfd687918983e78ecc12a0308f95ec47.js
-
Size
29KB
-
MD5
d34a29506f9838ca335d18156e2fdebd
-
SHA1
c1ffab611536705707c4d597bec4c25719200567
-
SHA256
7460accf81db3640d5f7e1e7b430431adfd687918983e78ecc12a0308f95ec47
-
SHA512
77413597ba2966dc8a3951dfbaeee85bb5407125716d950cf35f28ad8418ca157bf0035bf85691240bc3c0ca1ceeba80fd094eba2d360f5af11c94ddf5518724
Malware Config
Signatures
-
Blocklisted process makes network request 4 IoCs
flow pid Process 6 1928 wscript.exe 8 1928 wscript.exe 10 1928 wscript.exe 12 1928 wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.