Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
17-06-2022 15:11
Static task
static1
Behavioral task
behavioral1
Sample
yBzacvcZKX.js
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
yBzacvcZKX.js
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
yBzacvcZKX.js
-
Size
24KB
-
MD5
9cb94db4ae02bd253f2a41995076f5d2
-
SHA1
51ff0dc0516a93a8ac5620ccfa4b0e7750ebaeb1
-
SHA256
16288f415596cee7e80051087859c51cd5f2a44cc0c98b708b78a87f89c0a9ec
-
SHA512
f3277d959dc34dc4d920261de1cdcf82712982d543b7901f5ddfa7f0a793a33670aa1fec23aa7468ade221e275b02cfa948d3d15aa8fe63a3a011d3363ee4161
Score
10/10
Malware Config
Signatures
-
Blocklisted process makes network request 16 IoCs
Processes:
wscript.exeflow pid process 4 1864 wscript.exe 5 1864 wscript.exe 6 1864 wscript.exe 8 1864 wscript.exe 10 1864 wscript.exe 11 1864 wscript.exe 13 1864 wscript.exe 14 1864 wscript.exe 15 1864 wscript.exe 17 1864 wscript.exe 18 1864 wscript.exe 19 1864 wscript.exe 21 1864 wscript.exe 22 1864 wscript.exe 23 1864 wscript.exe 25 1864 wscript.exe -
Drops startup file 2 IoCs
Processes:
wscript.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\yBzacvcZKX.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\yBzacvcZKX.js wscript.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
wscript.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Run\YVBPFHTJIQ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\yBzacvcZKX.js\"" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.