Analysis
-
max time kernel
152s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
22-06-2022 08:46
Static task
static1
Behavioral task
behavioral1
Sample
?? ??? ??????????? ??????.jse
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
?? ??? ??????????? ??????.jse
Resource
win10v2004-20220414-en
General
-
Target
?? ??? ??????????? ??????.jse
-
Size
5KB
-
MD5
21edf1a6ae8e0a869aca1890b3e34a97
-
SHA1
cd19915eb44c6b5d8ec3397db1280bbfbca16435
-
SHA256
073321b040b9b6820c5701dd61732c1aa88ac7e40687f14c0e37ebd1253211de
-
SHA512
00c9aeab7a5ce8f2fda77e7a051bc219fc2b9de25cce32deb0073c3bd6cbc3da4a5a61d2c4a2c7b1b85344b82f64a672758ab04d1073f3f19ec1f9c7d30e9a99
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 4 1596 WScript.exe 6 1596 WScript.exe -
Deletes itself 1 IoCs
pid Process 1596 WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 10 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000_CLASSES\tmp_auto_file\shell\Read rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000_CLASSES\tmp_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000_CLASSES\.tmp\ = "tmp_auto_file" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000_CLASSES\tmp_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000_CLASSES\.tmp rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000_CLASSES\tmp_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000_CLASSES\tmp_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000_CLASSES\tmp_auto_file rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 560 AcroRd32.exe 560 AcroRd32.exe 560 AcroRd32.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1596 wrote to memory of 1944 1596 WScript.exe 29 PID 1596 wrote to memory of 1944 1596 WScript.exe 29 PID 1596 wrote to memory of 1944 1596 WScript.exe 29 PID 1944 wrote to memory of 1980 1944 cmd.exe 31 PID 1944 wrote to memory of 1980 1944 cmd.exe 31 PID 1944 wrote to memory of 1980 1944 cmd.exe 31 PID 1980 wrote to memory of 560 1980 rundll32.exe 33 PID 1980 wrote to memory of 560 1980 rundll32.exe 33 PID 1980 wrote to memory of 560 1980 rundll32.exe 33 PID 1980 wrote to memory of 560 1980 rundll32.exe 33
Processes
-
C:\Windows\System32\WScript.exeC:\Windows\System32\WScript.exe "C:\Users\Admin\AppData\Local\Temp\__ ___ ___________ ______.jse"1⤵
- Blocklisted process makes network request
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\rad8FDA9.tmp2⤵
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\rad8FDA9.tmp3⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\rad8FDA9.tmp"4⤵
- Suspicious use of SetWindowsHookEx
PID:560
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD5ea24bc598bea877cebd270701012ee09
SHA17132efeab2250a2294951156056ce5de74a40fed
SHA256f410c1348fd54a54ba3b041407aec74d2a38fe9ea7118e0163d0f21f5181eaa4
SHA512c9fe24c3d28c042692ace2f8391a9d46cb22da2c2dbfd9f9dbf323469a2678a894172339ece321ed72ebe7dd607bbc558c90f18b080db24cb8ba95204814e76e