Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
22/12/2022, 23:54
Static task
static1
Behavioral task
behavioral1
Sample
5597f148d24f8999fa0e961445c95d0b854a8c296a46cb92db48ddbc1ecc341f.js
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5597f148d24f8999fa0e961445c95d0b854a8c296a46cb92db48ddbc1ecc341f.js
Resource
win10v2004-20221111-en
General
-
Target
5597f148d24f8999fa0e961445c95d0b854a8c296a46cb92db48ddbc1ecc341f.js
-
Size
1.1MB
-
MD5
38384d69c165b100f3e0bb9628feab41
-
SHA1
e5d43d8c4e69c1b11eb0e98bef644440e7a1ea5a
-
SHA256
5597f148d24f8999fa0e961445c95d0b854a8c296a46cb92db48ddbc1ecc341f
-
SHA512
e0cd055fd8dbcbeca87826e5f91ffdcc5b2aed225a9aa6136d1ee9538d9ca2d4ec9fe8d7d50bb9acaddb475b789c5cd9bbd9f78d0f3b8aa5074fd911f5672d3b
-
SSDEEP
12288:GtHYDeDuDLzi5Zvhxuw/9qfuu7u0mqY4KjqjxXlb67SlkEbDVk:Y7xp9qfuu7u0mqY4K+SmlkEXVk
Malware Config
Signatures
-
Blocklisted process makes network request 53 IoCs
flow pid Process 6 1340 wscript.exe 9 664 wscript.exe 11 968 wscript.exe 13 664 wscript.exe 14 664 wscript.exe 16 1340 wscript.exe 17 968 wscript.exe 19 664 wscript.exe 22 968 wscript.exe 24 1340 wscript.exe 27 664 wscript.exe 30 968 wscript.exe 32 1340 wscript.exe 33 664 wscript.exe 35 664 wscript.exe 37 1340 wscript.exe 39 968 wscript.exe 41 664 wscript.exe 43 968 wscript.exe 45 1340 wscript.exe 48 664 wscript.exe 50 968 wscript.exe 52 1340 wscript.exe 53 664 wscript.exe 56 664 wscript.exe 58 968 wscript.exe 60 1340 wscript.exe 62 664 wscript.exe 64 968 wscript.exe 65 1340 wscript.exe 68 664 wscript.exe 71 1340 wscript.exe 72 968 wscript.exe 74 664 wscript.exe 77 968 wscript.exe 78 1340 wscript.exe 79 664 wscript.exe 81 664 wscript.exe 83 968 wscript.exe 85 1340 wscript.exe 89 664 wscript.exe 91 968 wscript.exe 93 1340 wscript.exe 94 664 wscript.exe 97 968 wscript.exe 98 1340 wscript.exe 99 664 wscript.exe 103 968 wscript.exe 104 664 wscript.exe 106 1340 wscript.exe 109 664 wscript.exe 111 1340 wscript.exe 113 968 wscript.exe -
Drops startup file 5 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cGgozkzQYb.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cGgozkzQYb.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\5597f148d24f8999fa0e961445c95d0b854a8c296a46cb92db48ddbc1ecc341f.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cGgozkzQYb.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\5597f148d24f8999fa0e961445c95d0b854a8c296a46cb92db48ddbc1ecc341f.js wscript.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\5597f148d24f8999fa0e961445c95d0b854a8c296a46cb92db48ddbc1ecc341f = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\5597f148d24f8999fa0e961445c95d0b854a8c296a46cb92db48ddbc1ecc341f.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\5597f148d24f8999fa0e961445c95d0b854a8c296a46cb92db48ddbc1ecc341f = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\5597f148d24f8999fa0e961445c95d0b854a8c296a46cb92db48ddbc1ecc341f.js\"" wscript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\5597f148d24f8999fa0e961445c95d0b854a8c296a46cb92db48ddbc1ecc341f = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\5597f148d24f8999fa0e961445c95d0b854a8c296a46cb92db48ddbc1ecc341f.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\5597f148d24f8999fa0e961445c95d0b854a8c296a46cb92db48ddbc1ecc341f = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\5597f148d24f8999fa0e961445c95d0b854a8c296a46cb92db48ddbc1ecc341f.js\"" wscript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 8 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 656 wrote to memory of 1340 656 wscript.exe 28 PID 656 wrote to memory of 1340 656 wscript.exe 28 PID 656 wrote to memory of 1340 656 wscript.exe 28 PID 656 wrote to memory of 664 656 wscript.exe 29 PID 656 wrote to memory of 664 656 wscript.exe 29 PID 656 wrote to memory of 664 656 wscript.exe 29 PID 664 wrote to memory of 968 664 wscript.exe 31 PID 664 wrote to memory of 968 664 wscript.exe 31 PID 664 wrote to memory of 968 664 wscript.exe 31
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\5597f148d24f8999fa0e961445c95d0b854a8c296a46cb92db48ddbc1ecc341f.js1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:656 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\cGgozkzQYb.js"2⤵
- Blocklisted process makes network request
- Drops startup file
PID:1340
-
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\5597f148d24f8999fa0e961445c95d0b854a8c296a46cb92db48ddbc1ecc341f.js"2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:664 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\cGgozkzQYb.js"3⤵
- Blocklisted process makes network request
- Drops startup file
PID:968
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD538384d69c165b100f3e0bb9628feab41
SHA1e5d43d8c4e69c1b11eb0e98bef644440e7a1ea5a
SHA2565597f148d24f8999fa0e961445c95d0b854a8c296a46cb92db48ddbc1ecc341f
SHA512e0cd055fd8dbcbeca87826e5f91ffdcc5b2aed225a9aa6136d1ee9538d9ca2d4ec9fe8d7d50bb9acaddb475b789c5cd9bbd9f78d0f3b8aa5074fd911f5672d3b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\5597f148d24f8999fa0e961445c95d0b854a8c296a46cb92db48ddbc1ecc341f.js
Filesize1.1MB
MD538384d69c165b100f3e0bb9628feab41
SHA1e5d43d8c4e69c1b11eb0e98bef644440e7a1ea5a
SHA2565597f148d24f8999fa0e961445c95d0b854a8c296a46cb92db48ddbc1ecc341f
SHA512e0cd055fd8dbcbeca87826e5f91ffdcc5b2aed225a9aa6136d1ee9538d9ca2d4ec9fe8d7d50bb9acaddb475b789c5cd9bbd9f78d0f3b8aa5074fd911f5672d3b
-
Filesize
299KB
MD5e25921817f40444325fb0903c802f7e8
SHA11378235074917b2322409957a81de7cc13cc516d
SHA25651f3bdda25cd5c326a09abfbbe09b17cc71d5693a4d5650bb6d5a7a73980095a
SHA51224c2c7dc61ddd95c55b69a29b7cf3b8336d24eabc0cd89b4639d701851508265564d53b4fa4db2f48a1aa770919983820474e79f8f6d2868755996c30a35ada2
-
Filesize
299KB
MD5e25921817f40444325fb0903c802f7e8
SHA11378235074917b2322409957a81de7cc13cc516d
SHA25651f3bdda25cd5c326a09abfbbe09b17cc71d5693a4d5650bb6d5a7a73980095a
SHA51224c2c7dc61ddd95c55b69a29b7cf3b8336d24eabc0cd89b4639d701851508265564d53b4fa4db2f48a1aa770919983820474e79f8f6d2868755996c30a35ada2
-
Filesize
299KB
MD5e25921817f40444325fb0903c802f7e8
SHA11378235074917b2322409957a81de7cc13cc516d
SHA25651f3bdda25cd5c326a09abfbbe09b17cc71d5693a4d5650bb6d5a7a73980095a
SHA51224c2c7dc61ddd95c55b69a29b7cf3b8336d24eabc0cd89b4639d701851508265564d53b4fa4db2f48a1aa770919983820474e79f8f6d2868755996c30a35ada2