Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
16/01/2023, 08:56
Static task
static1
Behavioral task
behavioral1
Sample
cd6b788372fc6c577a7f0de514ee7a4ed42da59b866581ddeb0e6c38228428d3.js
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
cd6b788372fc6c577a7f0de514ee7a4ed42da59b866581ddeb0e6c38228428d3.js
Resource
win10v2004-20221111-en
General
-
Target
cd6b788372fc6c577a7f0de514ee7a4ed42da59b866581ddeb0e6c38228428d3.js
-
Size
260KB
-
MD5
ec87b49270ad1afb170890fc4644bd59
-
SHA1
997f47e7d0bd7bc4ba59c2b737c0b5e108858b62
-
SHA256
cd6b788372fc6c577a7f0de514ee7a4ed42da59b866581ddeb0e6c38228428d3
-
SHA512
2daa9b36563380a3d55f2a0ec8ddbd1b8fe5d045acb9b98fb210af0e861ed523adef67ee791680e9a9608733e89ba274507ed2405ac9191f62e01f709f19162f
-
SSDEEP
6144:EPP/pyxHpiGSxCXJZTv+jCtMX1/MJIUDKi:EPHpyR17r+jCtMl/kD9
Malware Config
Signatures
-
Blocklisted process makes network request 53 IoCs
flow pid Process 10 784 wscript.exe 11 1768 wscript.exe 12 1504 wscript.exe 14 784 wscript.exe 15 784 wscript.exe 18 1504 wscript.exe 19 1768 wscript.exe 20 784 wscript.exe 23 1768 wscript.exe 24 1504 wscript.exe 29 784 wscript.exe 31 1768 wscript.exe 32 1504 wscript.exe 34 784 wscript.exe 36 784 wscript.exe 39 1768 wscript.exe 40 1504 wscript.exe 42 784 wscript.exe 44 1768 wscript.exe 45 1504 wscript.exe 49 784 wscript.exe 51 1768 wscript.exe 52 1504 wscript.exe 54 784 wscript.exe 57 784 wscript.exe 59 1768 wscript.exe 61 1504 wscript.exe 62 784 wscript.exe 64 1768 wscript.exe 66 1504 wscript.exe 69 784 wscript.exe 72 1768 wscript.exe 73 1504 wscript.exe 76 784 wscript.exe 77 1768 wscript.exe 79 784 wscript.exe 80 1504 wscript.exe 82 784 wscript.exe 84 1768 wscript.exe 86 1504 wscript.exe 90 784 wscript.exe 92 1768 wscript.exe 93 1504 wscript.exe 95 784 wscript.exe 97 1768 wscript.exe 99 1504 wscript.exe 100 784 wscript.exe 103 1768 wscript.exe 105 784 wscript.exe 106 1504 wscript.exe 110 784 wscript.exe 112 1768 wscript.exe 113 1504 wscript.exe -
Drops startup file 5 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PQqoNmhZsB.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PQqoNmhZsB.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PQqoNmhZsB.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cd6b788372fc6c577a7f0de514ee7a4ed42da59b866581ddeb0e6c38228428d3.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cd6b788372fc6c577a7f0de514ee7a4ed42da59b866581ddeb0e6c38228428d3.js wscript.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\cd6b788372fc6c577a7f0de514ee7a4ed42da59b866581ddeb0e6c38228428d3 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\cd6b788372fc6c577a7f0de514ee7a4ed42da59b866581ddeb0e6c38228428d3.js\"" wscript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cd6b788372fc6c577a7f0de514ee7a4ed42da59b866581ddeb0e6c38228428d3 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\cd6b788372fc6c577a7f0de514ee7a4ed42da59b866581ddeb0e6c38228428d3.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\cd6b788372fc6c577a7f0de514ee7a4ed42da59b866581ddeb0e6c38228428d3 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\cd6b788372fc6c577a7f0de514ee7a4ed42da59b866581ddeb0e6c38228428d3.js\"" wscript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cd6b788372fc6c577a7f0de514ee7a4ed42da59b866581ddeb0e6c38228428d3 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\cd6b788372fc6c577a7f0de514ee7a4ed42da59b866581ddeb0e6c38228428d3.js\"" wscript.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 8 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 956 wrote to memory of 1504 956 wscript.exe 28 PID 956 wrote to memory of 1504 956 wscript.exe 28 PID 956 wrote to memory of 1504 956 wscript.exe 28 PID 956 wrote to memory of 784 956 wscript.exe 29 PID 956 wrote to memory of 784 956 wscript.exe 29 PID 956 wrote to memory of 784 956 wscript.exe 29 PID 784 wrote to memory of 1768 784 wscript.exe 30 PID 784 wrote to memory of 1768 784 wscript.exe 30 PID 784 wrote to memory of 1768 784 wscript.exe 30
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\cd6b788372fc6c577a7f0de514ee7a4ed42da59b866581ddeb0e6c38228428d3.js1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\PQqoNmhZsB.js"2⤵
- Blocklisted process makes network request
- Drops startup file
PID:1504
-
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\cd6b788372fc6c577a7f0de514ee7a4ed42da59b866581ddeb0e6c38228428d3.js"2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\PQqoNmhZsB.js"3⤵
- Blocklisted process makes network request
- Drops startup file
PID:1768
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cd6b788372fc6c577a7f0de514ee7a4ed42da59b866581ddeb0e6c38228428d3.js
Filesize260KB
MD5ec87b49270ad1afb170890fc4644bd59
SHA1997f47e7d0bd7bc4ba59c2b737c0b5e108858b62
SHA256cd6b788372fc6c577a7f0de514ee7a4ed42da59b866581ddeb0e6c38228428d3
SHA5122daa9b36563380a3d55f2a0ec8ddbd1b8fe5d045acb9b98fb210af0e861ed523adef67ee791680e9a9608733e89ba274507ed2405ac9191f62e01f709f19162f
-
Filesize
6KB
MD5a46a00fce7c7561dd03f37519c548491
SHA1d707d5893467538b1ef934900fa7953b0ba3be37
SHA256db64faff8266eb46d6e649170da234562332aeb11b6e7adc3073739906a8592b
SHA51261295739a668d5c286bce20c643e2b1498ffc2f4a2873177b655bf9b8fe534c041a12da95ffa0552e1b76ba2ad09344d5bfc70ba09e03a43d08f01a59f992f8c
-
Filesize
6KB
MD5a46a00fce7c7561dd03f37519c548491
SHA1d707d5893467538b1ef934900fa7953b0ba3be37
SHA256db64faff8266eb46d6e649170da234562332aeb11b6e7adc3073739906a8592b
SHA51261295739a668d5c286bce20c643e2b1498ffc2f4a2873177b655bf9b8fe534c041a12da95ffa0552e1b76ba2ad09344d5bfc70ba09e03a43d08f01a59f992f8c
-
Filesize
260KB
MD5ec87b49270ad1afb170890fc4644bd59
SHA1997f47e7d0bd7bc4ba59c2b737c0b5e108858b62
SHA256cd6b788372fc6c577a7f0de514ee7a4ed42da59b866581ddeb0e6c38228428d3
SHA5122daa9b36563380a3d55f2a0ec8ddbd1b8fe5d045acb9b98fb210af0e861ed523adef67ee791680e9a9608733e89ba274507ed2405ac9191f62e01f709f19162f