Analysis
-
max time kernel
37s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
25-07-2022 16:01
Static task
static1
Behavioral task
behavioral1
Sample
Document_8178908243US_Apr_20_2019.js
Resource
win7-20220718-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
Document_8178908243US_Apr_20_2019.js
Resource
win10v2004-20220721-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
Document_8178908243US_Apr_20_2019.js
-
Size
38KB
-
MD5
85ed645c9a46521018e97abbc4605395
-
SHA1
dbbeea5fd963bddb9a826ab6b6b44d3b5a651599
-
SHA256
79c6cc4ed2307ad107c2b7018b2ce8ed6887f85c1034c6c04766c255c1932d06
-
SHA512
e557b95e3a213f2c01418c14c51c4a5a5b4e369032a390d68b414bb205185c67b9688f954b7212baf653e1e8e93e06ce71434befba005da0afd24809b60c61ec
Score
8/10
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
Processes:
wscript.exeflow pid process 4 1860 wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
Processes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1860-54-0x000007FEFBCF1000-0x000007FEFBCF3000-memory.dmpFilesize
8KB