Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27-10-2022 17:41
Static task
static1
Behavioral task
behavioral1
Sample
Mutual.pdf
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
Mutual.pdf
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
Mutual_67.pdf.exe
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
Mutual_67.pdf.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
name.js
Resource
win7-20220812-en
General
-
Target
name.js
-
Size
2.9MB
-
MD5
a9f348be577f108d379aad0028581b62
-
SHA1
1b40e0080a659f9be8bc5f7d6ca55f455a8878d2
-
SHA256
9738196ea440301b0666fb6553b69e79ca60a563b6577d77d40aa871ed25c366
-
SHA512
6cb731f4f822de8a27738c1613e3633cc5c090f801dfb696f1c0eea6d389836be99c591e30886cceb895cf538b908ffa958c3ecebe7990032a9b265ed0b55274
-
SSDEEP
49152:kbjaWSNgrJ33PjAgEhI5rxK0uEuiY0YtZMK23Y:f
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2000 wrote to memory of 1340 2000 wscript.exe 27 PID 2000 wrote to memory of 1340 2000 wscript.exe 27 PID 2000 wrote to memory of 1340 2000 wscript.exe 27
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\name.js1⤵
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\System32\cmdkey.exe"C:\Windows\System32\cmdkey.exe" /generic:Microsoft_Windows_Shell_ZipFolder:filename=C:\Users\Admin\AppData\Local\Temp\2510c_cr69.zip /pass:kLjBEyO /user:""2⤵PID:1340
-