Analysis

  • max time kernel
    43s
  • max time network
    31s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    30-11-2022 09:37

General

  • Target

    fix/resetting.js

  • Size

    130B

  • MD5

    07bea373c9154e9d1e952284573d78f2

  • SHA1

    c3a5772930125410b68d9cea820a5c0b3ac6d266

  • SHA256

    8d8618f5a460543cbefc214f1a63c63eccae9759096751f546c00ebf20f7be37

  • SHA512

    7e7b8b651adf185b34366ef0be05608f49d5239a87dfe52bb1f6195820900f1d258f96b58db027dfa4aef9cfc95357433f6414808b47ad3816be825973fc28f5

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\fix\resetting.js
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1452
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass fix\scaly.ps1
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1112

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1112-55-0x0000000000000000-mapping.dmp
  • memory/1112-57-0x000007FEF3ED0000-0x000007FEF48F3000-memory.dmp
    Filesize

    10.1MB

  • memory/1112-58-0x000007FEF32B0000-0x000007FEF3E0D000-memory.dmp
    Filesize

    11.4MB

  • memory/1112-59-0x000000001B7D0000-0x000000001BACF000-memory.dmp
    Filesize

    3.0MB

  • memory/1112-60-0x00000000028D4000-0x00000000028D7000-memory.dmp
    Filesize

    12KB

  • memory/1112-61-0x00000000028DB000-0x00000000028FA000-memory.dmp
    Filesize

    124KB

  • memory/1112-62-0x00000000028D4000-0x00000000028D7000-memory.dmp
    Filesize

    12KB

  • memory/1112-63-0x00000000028DB000-0x00000000028FA000-memory.dmp
    Filesize

    124KB

  • memory/1452-54-0x000007FEFC181000-0x000007FEFC183000-memory.dmp
    Filesize

    8KB