Analysis
-
max time kernel
141s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
20-06-2022 09:42
Static task
static1
Behavioral task
behavioral1
Sample
zpgygxtRex.js
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
zpgygxtRex.js
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
zpgygxtRex.js
-
Size
30KB
-
MD5
7c2e7e5a48421b27561a23936f1d9fee
-
SHA1
739fde5b0ad4d2f651a16e2458bf3e64bfa748b0
-
SHA256
c409b163881ea5ee746756d65f515f7a5dca8b622e6d1e557ef963acb6849000
-
SHA512
149fe69bf7b778ca8e450c2b0d3c4b54a34023b908b8705a65d8da9d060b0e4e46346664f45e100969af3c21315f2bcd9f517ee99b94dfe5bf8134c9cf0dc323
Score
10/10
Malware Config
Signatures
-
Blocklisted process makes network request 14 IoCs
Processes:
wscript.exeflow pid process 6 4688 wscript.exe 17 4688 wscript.exe 20 4688 wscript.exe 31 4688 wscript.exe 37 4688 wscript.exe 38 4688 wscript.exe 41 4688 wscript.exe 42 4688 wscript.exe 43 4688 wscript.exe 46 4688 wscript.exe 47 4688 wscript.exe 48 4688 wscript.exe 49 4688 wscript.exe 50 4688 wscript.exe -
Drops startup file 2 IoCs
Processes:
wscript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\zpgygxtRex.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\zpgygxtRex.js wscript.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
wscript.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Windows\CurrentVersion\Run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\YVBPFHTJIQ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\zpgygxtRex.js\"" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.