Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
01-02-2022 05:42
Static task
static1
Behavioral task
behavioral1
Sample
73da7ffa3619e3e8afbc2334219f1bd4be18b4128d835e2dfa9db8e3a9e239f5.js
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
73da7ffa3619e3e8afbc2334219f1bd4be18b4128d835e2dfa9db8e3a9e239f5.js
Resource
win10v2004-en-20220113
General
-
Target
73da7ffa3619e3e8afbc2334219f1bd4be18b4128d835e2dfa9db8e3a9e239f5.js
-
Size
26KB
-
MD5
5e56d42c27affc6c662d1d43b9b4ef1d
-
SHA1
6ebf6ec3ec7df9003172d2f7d184e57bbeee4a83
-
SHA256
73da7ffa3619e3e8afbc2334219f1bd4be18b4128d835e2dfa9db8e3a9e239f5
-
SHA512
9cc9688e1ed5c6497360de986e9a5d9f4f6620d3318705b9d661f56761a5591da321ea569804915ef5844ddf01a1ed8cfd91e63f6d336b98c96ae9a5ecff3bc1
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 5 1592 wscript.exe 7 1592 wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.