Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-06-2022 09:42
Static task
static1
Behavioral task
behavioral1
Sample
zpgygxtRex.js
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
zpgygxtRex.js
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
zpgygxtRex.js
-
Size
30KB
-
MD5
7c2e7e5a48421b27561a23936f1d9fee
-
SHA1
739fde5b0ad4d2f651a16e2458bf3e64bfa748b0
-
SHA256
c409b163881ea5ee746756d65f515f7a5dca8b622e6d1e557ef963acb6849000
-
SHA512
149fe69bf7b778ca8e450c2b0d3c4b54a34023b908b8705a65d8da9d060b0e4e46346664f45e100969af3c21315f2bcd9f517ee99b94dfe5bf8134c9cf0dc323
Score
10/10
Malware Config
Signatures
-
Blocklisted process makes network request 15 IoCs
Processes:
wscript.exeflow pid process 4 1056 wscript.exe 5 1056 wscript.exe 6 1056 wscript.exe 8 1056 wscript.exe 10 1056 wscript.exe 11 1056 wscript.exe 13 1056 wscript.exe 14 1056 wscript.exe 15 1056 wscript.exe 17 1056 wscript.exe 18 1056 wscript.exe 19 1056 wscript.exe 21 1056 wscript.exe 22 1056 wscript.exe 23 1056 wscript.exe -
Drops startup file 2 IoCs
Processes:
wscript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\zpgygxtRex.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\zpgygxtRex.js wscript.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
wscript.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Run\YVBPFHTJIQ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\zpgygxtRex.js\"" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.