Analysis
-
max time kernel
167s -
max time network
182s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
16/01/2023, 08:47
Static task
static1
Behavioral task
behavioral1
Sample
7a9d74c5d107f2c91ae6414674542a85136b310b3948319ffea6139226eaaaee.js
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7a9d74c5d107f2c91ae6414674542a85136b310b3948319ffea6139226eaaaee.js
Resource
win10v2004-20221111-en
General
-
Target
7a9d74c5d107f2c91ae6414674542a85136b310b3948319ffea6139226eaaaee.js
-
Size
260KB
-
MD5
d4b928defdafd9c54fe69160ba650cc8
-
SHA1
041715d3775045016dfbebb68f8e4964c8ad123a
-
SHA256
7a9d74c5d107f2c91ae6414674542a85136b310b3948319ffea6139226eaaaee
-
SHA512
a77cc501a0fb679cc407f97e84af603f90dd8451ea66cf49a1cc76698f1fcaddb6f28f08aa090f38f9004763ccc020d16a069ae5f9ec609a982c39042db668c4
-
SSDEEP
6144:EPP/pyxHpiGSxCXJZTv+jCtMX1/MJIUDKi:EPXpyR17r+jCtMl/kD9
Malware Config
Signatures
-
Blocklisted process makes network request 53 IoCs
flow pid Process 9 864 wscript.exe 10 1028 wscript.exe 12 1492 wscript.exe 14 864 wscript.exe 15 864 wscript.exe 16 1492 wscript.exe 18 1028 wscript.exe 20 864 wscript.exe 23 1492 wscript.exe 25 1028 wscript.exe 28 864 wscript.exe 30 1028 wscript.exe 32 1492 wscript.exe 33 864 wscript.exe 35 1028 wscript.exe 36 1492 wscript.exe 38 864 wscript.exe 40 864 wscript.exe 41 1028 wscript.exe 44 1492 wscript.exe 47 864 wscript.exe 49 1492 wscript.exe 51 1028 wscript.exe 52 864 wscript.exe 54 1492 wscript.exe 57 1028 wscript.exe 58 864 wscript.exe 59 864 wscript.exe 60 1492 wscript.exe 62 1028 wscript.exe 66 864 wscript.exe 69 1028 wscript.exe 71 1492 wscript.exe 72 864 wscript.exe 73 1028 wscript.exe 74 1492 wscript.exe 76 864 wscript.exe 77 1028 wscript.exe 79 1492 wscript.exe 81 864 wscript.exe 85 864 wscript.exe 86 1028 wscript.exe 89 1492 wscript.exe 90 864 wscript.exe 92 1492 wscript.exe 93 1028 wscript.exe 95 864 wscript.exe 98 1492 wscript.exe 99 1028 wscript.exe 101 864 wscript.exe 104 864 wscript.exe 105 1028 wscript.exe 107 1492 wscript.exe -
Drops startup file 5 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7a9d74c5d107f2c91ae6414674542a85136b310b3948319ffea6139226eaaaee.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EZIcjnTabV.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EZIcjnTabV.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7a9d74c5d107f2c91ae6414674542a85136b310b3948319ffea6139226eaaaee.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EZIcjnTabV.js wscript.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\7a9d74c5d107f2c91ae6414674542a85136b310b3948319ffea6139226eaaaee = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\7a9d74c5d107f2c91ae6414674542a85136b310b3948319ffea6139226eaaaee.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\7a9d74c5d107f2c91ae6414674542a85136b310b3948319ffea6139226eaaaee = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\7a9d74c5d107f2c91ae6414674542a85136b310b3948319ffea6139226eaaaee.js\"" wscript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\7a9d74c5d107f2c91ae6414674542a85136b310b3948319ffea6139226eaaaee = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\7a9d74c5d107f2c91ae6414674542a85136b310b3948319ffea6139226eaaaee.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\7a9d74c5d107f2c91ae6414674542a85136b310b3948319ffea6139226eaaaee = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\7a9d74c5d107f2c91ae6414674542a85136b310b3948319ffea6139226eaaaee.js\"" wscript.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 7 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1708 wrote to memory of 1028 1708 wscript.exe 28 PID 1708 wrote to memory of 1028 1708 wscript.exe 28 PID 1708 wrote to memory of 1028 1708 wscript.exe 28 PID 1708 wrote to memory of 864 1708 wscript.exe 29 PID 1708 wrote to memory of 864 1708 wscript.exe 29 PID 1708 wrote to memory of 864 1708 wscript.exe 29 PID 864 wrote to memory of 1492 864 wscript.exe 31 PID 864 wrote to memory of 1492 864 wscript.exe 31 PID 864 wrote to memory of 1492 864 wscript.exe 31
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\7a9d74c5d107f2c91ae6414674542a85136b310b3948319ffea6139226eaaaee.js1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\EZIcjnTabV.js"2⤵
- Blocklisted process makes network request
- Drops startup file
PID:1028
-
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\7a9d74c5d107f2c91ae6414674542a85136b310b3948319ffea6139226eaaaee.js"2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\EZIcjnTabV.js"3⤵
- Blocklisted process makes network request
- Drops startup file
PID:1492
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
260KB
MD5d4b928defdafd9c54fe69160ba650cc8
SHA1041715d3775045016dfbebb68f8e4964c8ad123a
SHA2567a9d74c5d107f2c91ae6414674542a85136b310b3948319ffea6139226eaaaee
SHA512a77cc501a0fb679cc407f97e84af603f90dd8451ea66cf49a1cc76698f1fcaddb6f28f08aa090f38f9004763ccc020d16a069ae5f9ec609a982c39042db668c4
-
Filesize
6KB
MD5a46a00fce7c7561dd03f37519c548491
SHA1d707d5893467538b1ef934900fa7953b0ba3be37
SHA256db64faff8266eb46d6e649170da234562332aeb11b6e7adc3073739906a8592b
SHA51261295739a668d5c286bce20c643e2b1498ffc2f4a2873177b655bf9b8fe534c041a12da95ffa0552e1b76ba2ad09344d5bfc70ba09e03a43d08f01a59f992f8c
-
Filesize
6KB
MD5a46a00fce7c7561dd03f37519c548491
SHA1d707d5893467538b1ef934900fa7953b0ba3be37
SHA256db64faff8266eb46d6e649170da234562332aeb11b6e7adc3073739906a8592b
SHA51261295739a668d5c286bce20c643e2b1498ffc2f4a2873177b655bf9b8fe534c041a12da95ffa0552e1b76ba2ad09344d5bfc70ba09e03a43d08f01a59f992f8c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7a9d74c5d107f2c91ae6414674542a85136b310b3948319ffea6139226eaaaee.js
Filesize260KB
MD5d4b928defdafd9c54fe69160ba650cc8
SHA1041715d3775045016dfbebb68f8e4964c8ad123a
SHA2567a9d74c5d107f2c91ae6414674542a85136b310b3948319ffea6139226eaaaee
SHA512a77cc501a0fb679cc407f97e84af603f90dd8451ea66cf49a1cc76698f1fcaddb6f28f08aa090f38f9004763ccc020d16a069ae5f9ec609a982c39042db668c4
-
Filesize
6KB
MD5a46a00fce7c7561dd03f37519c548491
SHA1d707d5893467538b1ef934900fa7953b0ba3be37
SHA256db64faff8266eb46d6e649170da234562332aeb11b6e7adc3073739906a8592b
SHA51261295739a668d5c286bce20c643e2b1498ffc2f4a2873177b655bf9b8fe534c041a12da95ffa0552e1b76ba2ad09344d5bfc70ba09e03a43d08f01a59f992f8c