Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
09-08-2022 18:38
Static task
static1
Behavioral task
behavioral1
Sample
Quote_PDF.js
Resource
win7-20220718-en
General
-
Target
Quote_PDF.js
-
Size
592KB
-
MD5
edd15033148bf7e2bf4125c4d211e8ca
-
SHA1
bdb2ed893df770f57ef19cb2a6d2ffbac1fde78e
-
SHA256
c1a07cde2b35fc342b437b715d447a564db513a7c23223ba66f7d68da74d368d
-
SHA512
42d46d1607d1efa75e3ab540334afab109825209fdff8226f2e2a57a62c39df8c007995f93b3eae03567ea58b2ca5ce3b6e42baf6febb3658b7fb906fbe7cf4d
Malware Config
Signatures
-
NetWire RAT payload 7 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\Host Ip Js StartUp.exe netwire C:\Users\Admin\AppData\Roaming\Host Ip Js StartUp.exe netwire \Users\Admin\AppData\Roaming\Googlee\Notepad.exe netwire \Users\Admin\AppData\Roaming\Googlee\Notepad.exe netwire C:\Users\Admin\AppData\Roaming\Googlee\Notepad.exe netwire C:\Users\Admin\AppData\Roaming\Googlee\Notepad.exe netwire \Users\Admin\AppData\Roaming\Googlee\Notepad.exe netwire -
Blocklisted process makes network request 32 IoCs
Processes:
wscript.exewscript.exeflow pid process 8 1216 wscript.exe 9 1720 wscript.exe 11 1216 wscript.exe 12 1720 wscript.exe 14 1216 wscript.exe 15 1720 wscript.exe 19 1216 wscript.exe 20 1720 wscript.exe 22 1216 wscript.exe 24 1720 wscript.exe 26 1216 wscript.exe 27 1720 wscript.exe 30 1720 wscript.exe 31 1216 wscript.exe 33 1720 wscript.exe 35 1216 wscript.exe 37 1216 wscript.exe 38 1720 wscript.exe 41 1720 wscript.exe 42 1216 wscript.exe 44 1720 wscript.exe 46 1216 wscript.exe 47 1720 wscript.exe 49 1216 wscript.exe 52 1720 wscript.exe 54 1216 wscript.exe 55 1720 wscript.exe 57 1216 wscript.exe 58 1720 wscript.exe 59 1216 wscript.exe 63 1720 wscript.exe 64 1216 wscript.exe -
Executes dropped EXE 2 IoCs
Processes:
Host Ip Js StartUp.exeNotepad.exepid process 1380 Host Ip Js StartUp.exe 1504 Notepad.exe -
Drops startup file 5 IoCs
Processes:
wscript.exewscript.exeNotepad.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\juIwXhspQL.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\juIwXhspQL.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\zyOjbguoaJ.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\zyOjbguoaJ.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Note.lnk Notepad.exe -
Loads dropped DLL 3 IoCs
Processes:
Host Ip Js StartUp.exeNotepad.exepid process 1380 Host Ip Js StartUp.exe 1380 Host Ip Js StartUp.exe 1504 Notepad.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
Notepad.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ Notepad.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Windows\CurrentVersion\Run\£2ëUíaÊ—KåL¦K®¨æ = "C:\\Users\\Admin\\AppData\\Roaming\\Googlee\\Notepad.exe" Notepad.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
wscript.exewscript.exewscript.exeHost Ip Js StartUp.exedescription pid process target process PID 1140 wrote to memory of 1216 1140 wscript.exe wscript.exe PID 1140 wrote to memory of 1216 1140 wscript.exe wscript.exe PID 1140 wrote to memory of 1216 1140 wscript.exe wscript.exe PID 1140 wrote to memory of 1380 1140 wscript.exe Host Ip Js StartUp.exe PID 1140 wrote to memory of 1380 1140 wscript.exe Host Ip Js StartUp.exe PID 1140 wrote to memory of 1380 1140 wscript.exe Host Ip Js StartUp.exe PID 1140 wrote to memory of 1380 1140 wscript.exe Host Ip Js StartUp.exe PID 1216 wrote to memory of 1720 1216 wscript.exe wscript.exe PID 1216 wrote to memory of 1720 1216 wscript.exe wscript.exe PID 1216 wrote to memory of 1720 1216 wscript.exe wscript.exe PID 1720 wrote to memory of 544 1720 wscript.exe wscript.exe PID 1720 wrote to memory of 544 1720 wscript.exe wscript.exe PID 1720 wrote to memory of 544 1720 wscript.exe wscript.exe PID 1380 wrote to memory of 1504 1380 Host Ip Js StartUp.exe Notepad.exe PID 1380 wrote to memory of 1504 1380 Host Ip Js StartUp.exe Notepad.exe PID 1380 wrote to memory of 1504 1380 Host Ip Js StartUp.exe Notepad.exe PID 1380 wrote to memory of 1504 1380 Host Ip Js StartUp.exe Notepad.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\Quote_PDF.js1⤵
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\zyOjbguoaJ.js"2⤵
- Blocklisted process makes network request
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\juIwXhspQL.js"3⤵
- Blocklisted process makes network request
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\oVKKrOdyJJ.js"4⤵PID:544
-
C:\Users\Admin\AppData\Roaming\Host Ip Js StartUp.exe"C:\Users\Admin\AppData\Roaming\Host Ip Js StartUp.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Users\Admin\AppData\Roaming\Googlee\Notepad.exe"C:\Users\Admin\AppData\Roaming\Googlee\Notepad.exe"3⤵
- Executes dropped EXE
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
PID:1504
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
227KB
MD5fc6330d62ae89347dddf9e98d6dc2533
SHA1b2a3104e8178e25b6b40cf8b19d60c1a4e03e969
SHA25672c15ab989fb449e62d6a560bdad1c9c39d61c21345322b8c1331235adf484a7
SHA5121cf0e356a72a525b585533adab9c2abe1cfef9127ef96fedefe840bf33248bb85752fd92ca447cc6ac2b0654b497c07e3e3d0f0e064958f0f17b3e79424d6a4c
-
Filesize
227KB
MD5fc6330d62ae89347dddf9e98d6dc2533
SHA1b2a3104e8178e25b6b40cf8b19d60c1a4e03e969
SHA25672c15ab989fb449e62d6a560bdad1c9c39d61c21345322b8c1331235adf484a7
SHA5121cf0e356a72a525b585533adab9c2abe1cfef9127ef96fedefe840bf33248bb85752fd92ca447cc6ac2b0654b497c07e3e3d0f0e064958f0f17b3e79424d6a4c
-
Filesize
227KB
MD5fc6330d62ae89347dddf9e98d6dc2533
SHA1b2a3104e8178e25b6b40cf8b19d60c1a4e03e969
SHA25672c15ab989fb449e62d6a560bdad1c9c39d61c21345322b8c1331235adf484a7
SHA5121cf0e356a72a525b585533adab9c2abe1cfef9127ef96fedefe840bf33248bb85752fd92ca447cc6ac2b0654b497c07e3e3d0f0e064958f0f17b3e79424d6a4c
-
Filesize
227KB
MD5fc6330d62ae89347dddf9e98d6dc2533
SHA1b2a3104e8178e25b6b40cf8b19d60c1a4e03e969
SHA25672c15ab989fb449e62d6a560bdad1c9c39d61c21345322b8c1331235adf484a7
SHA5121cf0e356a72a525b585533adab9c2abe1cfef9127ef96fedefe840bf33248bb85752fd92ca447cc6ac2b0654b497c07e3e3d0f0e064958f0f17b3e79424d6a4c
-
Filesize
38KB
MD518a451d41d501f501013b82c8697083e
SHA1e31027858b8dd30339db29453791ab9552fd2e0f
SHA256ca93d14291d1ee81cc27df8fc1b55092cb0e819d37233f1e0ddb963c10288d0f
SHA51246c4b7c1bf9e1470a0ae244e56c10d2d4db97ed5102a3dea27501f1aff6528cd70b9b452348f0d53b935b3d222c8c1401df7537e5202105b09e2b013fb4cb6aa
-
Filesize
7KB
MD53706cdda45b9643a81251d011c39e8e5
SHA11dcfc53931935cc86a459302777845271cf3e175
SHA2563787d7284843c9fda5c95d75eb8bc16c4c0b92b0bd84d58b1bb0fb00905ee612
SHA51251967bdb3ab98e4389b46a0f6e5feb98fb6009b630820d8236ce920f5c04a3f710a4cd871aa0b10d8a6979a469cbb2d5954a7e13afe54d55a0621a8943c36d32
-
Filesize
103KB
MD5f6de6532bcb5dff519b1571779b99199
SHA1898302bf728cd7784a0f171722bf232c32ab3ed1
SHA256a5d8777e4d074fd73a97218850e0883b07945eb9eed084765181da209e608d3a
SHA51265fe6d05b64ecd93addb82c8cf9936357bf23bbd9540208c614cc6d78a4027824fdf987410adffd84407d18a9de7623b1396ce3fd8d96000af2849f7fc69d3b1
-
Filesize
227KB
MD5fc6330d62ae89347dddf9e98d6dc2533
SHA1b2a3104e8178e25b6b40cf8b19d60c1a4e03e969
SHA25672c15ab989fb449e62d6a560bdad1c9c39d61c21345322b8c1331235adf484a7
SHA5121cf0e356a72a525b585533adab9c2abe1cfef9127ef96fedefe840bf33248bb85752fd92ca447cc6ac2b0654b497c07e3e3d0f0e064958f0f17b3e79424d6a4c
-
Filesize
227KB
MD5fc6330d62ae89347dddf9e98d6dc2533
SHA1b2a3104e8178e25b6b40cf8b19d60c1a4e03e969
SHA25672c15ab989fb449e62d6a560bdad1c9c39d61c21345322b8c1331235adf484a7
SHA5121cf0e356a72a525b585533adab9c2abe1cfef9127ef96fedefe840bf33248bb85752fd92ca447cc6ac2b0654b497c07e3e3d0f0e064958f0f17b3e79424d6a4c
-
Filesize
227KB
MD5fc6330d62ae89347dddf9e98d6dc2533
SHA1b2a3104e8178e25b6b40cf8b19d60c1a4e03e969
SHA25672c15ab989fb449e62d6a560bdad1c9c39d61c21345322b8c1331235adf484a7
SHA5121cf0e356a72a525b585533adab9c2abe1cfef9127ef96fedefe840bf33248bb85752fd92ca447cc6ac2b0654b497c07e3e3d0f0e064958f0f17b3e79424d6a4c