Analysis
-
max time kernel
155s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/11/2022, 07:50
Static task
static1
Behavioral task
behavioral1
Sample
Payment.js
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Payment.js
Resource
win10v2004-20220901-en
General
-
Target
Payment.js
-
Size
28KB
-
MD5
359404b0cab1f6527c6f200437696451
-
SHA1
9da5f4937f158978047db38d38eb9bc20196dc8d
-
SHA256
bb71355902607d2c6b880b49cbfce0c9fd98f03297e0836d3adbcbfba9ea5feb
-
SHA512
3bd9c816a8ab8515f7a02b9085c6b321fc6fd7d49d8d8b5e42d274b4db606cfa3f927ddb5741aa94edfb40fa2b4d042fa26e6e98d967920f22ab90ecef04d122
-
SSDEEP
768:73PRmOQmiKb7OjxQIjkhqxOjrptJ4fOhnFT:7OmiQkkhjrFzN
Malware Config
Signatures
-
Blocklisted process makes network request 31 IoCs
flow pid Process 6 560 wscript.exe 7 740 wscript.exe 8 740 wscript.exe 10 740 wscript.exe 11 740 wscript.exe 13 740 wscript.exe 14 740 wscript.exe 16 560 wscript.exe 19 740 wscript.exe 20 740 wscript.exe 22 740 wscript.exe 23 740 wscript.exe 24 740 wscript.exe 26 560 wscript.exe 27 740 wscript.exe 30 740 wscript.exe 31 740 wscript.exe 33 740 wscript.exe 35 740 wscript.exe 36 560 wscript.exe 38 740 wscript.exe 39 740 wscript.exe 41 740 wscript.exe 43 740 wscript.exe 45 740 wscript.exe 46 740 wscript.exe 47 560 wscript.exe 49 740 wscript.exe 50 740 wscript.exe 52 740 wscript.exe 54 740 wscript.exe -
Drops startup file 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Payment.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Payment.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\QoWJFExORY.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\QoWJFExORY.js wscript.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\2JZFR52JWJ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Payment.js\"" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 740 wrote to memory of 560 740 wscript.exe 27 PID 740 wrote to memory of 560 740 wscript.exe 27 PID 740 wrote to memory of 560 740 wscript.exe 27
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\Payment.js1⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\QoWJFExORY.js"2⤵
- Blocklisted process makes network request
- Drops startup file
PID:560
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD5b887f638862355636804bbe6e55e3a94
SHA135b8933be5d930d4cf360f2e8652d3d3bffe601c
SHA256c0a37899c089539026ac8580aa286cb460f3d0e0ba8b4a6c411b88fe84893bdd
SHA512b8c8f0d59b368c407993ab9b6c561f50bdb750e4e8c858415f387f94bac96915238b427b4847258808395ceb5af30848dba322511384bbe2c052b273ba141317