Analysis
-
max time kernel
35s -
max time network
42s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
31-10-2022 11:02
Static task
static1
Behavioral task
behavioral1
Sample
Mutual.pdf
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Mutual.pdf
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
Mutual_67.pdf.exe
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
Mutual_67.pdf.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
name.js
Resource
win7-20220812-en
General
-
Target
name.js
-
Size
2.9MB
-
MD5
a9f348be577f108d379aad0028581b62
-
SHA1
1b40e0080a659f9be8bc5f7d6ca55f455a8878d2
-
SHA256
9738196ea440301b0666fb6553b69e79ca60a563b6577d77d40aa871ed25c366
-
SHA512
6cb731f4f822de8a27738c1613e3633cc5c090f801dfb696f1c0eea6d389836be99c591e30886cceb895cf538b908ffa958c3ecebe7990032a9b265ed0b55274
-
SSDEEP
49152:kbjaWSNgrJ33PjAgEhI5rxK0uEuiY0YtZMK23Y:f
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1708 wrote to memory of 844 1708 wscript.exe 26 PID 1708 wrote to memory of 844 1708 wscript.exe 26 PID 1708 wrote to memory of 844 1708 wscript.exe 26
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\name.js1⤵
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\System32\cmdkey.exe"C:\Windows\System32\cmdkey.exe" /generic:Microsoft_Windows_Shell_ZipFolder:filename=C:\Users\Admin\AppData\Local\Temp\2510c_cr69.zip /pass:kLjBEyO /user:""2⤵PID:844
-