Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
15-02-2023 17:10
Static task
static1
Behavioral task
behavioral1
Sample
PO.230029.js
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
PO.230029.js
Resource
win10v2004-20221111-en
General
-
Target
PO.230029.js
-
Size
3.5MB
-
MD5
2760f9a45e9e74c4eedfe9b0ee918e6b
-
SHA1
277c62b14c987da3cf4c9e7d4ee4478cf61580c7
-
SHA256
18827fed6ecd5e4d2c548dcad1eb21730a95f52b578bed75e3003b06a7390482
-
SHA512
45aa5c7a51f644e82fc436029187fef542ee9a3be80ed8c3535c0383c938509f4d3f4414c97328430092bec1eed5a5105d47f45f36664f49c63a146b12a9fb7e
-
SSDEEP
6144:nDKcCNX9cMH0svW5he7NbWSRU9qB02HkyjM6P:nDupdf
Malware Config
Signatures
-
Blocklisted process makes network request 35 IoCs
flow pid Process 10 1360 wscript.exe 11 824 wscript.exe 12 1116 wscript.exe 13 1116 wscript.exe 15 1360 wscript.exe 17 1116 wscript.exe 18 1360 wscript.exe 23 824 wscript.exe 25 1116 wscript.exe 27 1360 wscript.exe 28 1116 wscript.exe 30 1360 wscript.exe 31 1116 wscript.exe 33 1360 wscript.exe 37 824 wscript.exe 39 1116 wscript.exe 40 1360 wscript.exe 42 1360 wscript.exe 44 1360 wscript.exe 48 1116 wscript.exe 50 824 wscript.exe 52 1360 wscript.exe 54 1116 wscript.exe 56 1360 wscript.exe 58 1116 wscript.exe 61 1360 wscript.exe 62 1116 wscript.exe 64 824 wscript.exe 66 1360 wscript.exe 68 1116 wscript.exe 71 1360 wscript.exe 72 1116 wscript.exe 75 1360 wscript.exe 76 1116 wscript.exe 78 824 wscript.exe -
Drops startup file 5 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PO.230029.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PO.230029.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EgxzFQzayc.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EgxzFQzayc.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EgxzFQzayc.js wscript.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\PO = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\PO.230029.js\"" wscript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\PO = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\PO.230029.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\PO = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\PO.230029.js\"" wscript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\PO = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\PO.230029.js\"" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1144 wrote to memory of 1360 1144 wscript.exe 28 PID 1144 wrote to memory of 1360 1144 wscript.exe 28 PID 1144 wrote to memory of 1360 1144 wscript.exe 28 PID 1144 wrote to memory of 824 1144 wscript.exe 29 PID 1144 wrote to memory of 824 1144 wscript.exe 29 PID 1144 wrote to memory of 824 1144 wscript.exe 29 PID 824 wrote to memory of 1116 824 wscript.exe 30 PID 824 wrote to memory of 1116 824 wscript.exe 30 PID 824 wrote to memory of 1116 824 wscript.exe 30
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\PO.230029.js1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\EgxzFQzayc.js"2⤵
- Blocklisted process makes network request
- Drops startup file
PID:1360
-
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\PO.230029.js"2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\EgxzFQzayc.js"3⤵
- Blocklisted process makes network request
- Drops startup file
PID:1116
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
346KB
MD55aa142c9e33d0c5d72f0fc4951e6c080
SHA1b20626787b7e3f16c2c8aa46489c60002be05b79
SHA256d0dbf9b445cc01f36e0d7b3483ade4479a2f1b54bf531716330b32b0d904d303
SHA512a8c9769fc98a8e867b0b5e8bd73fc602f906d63ead71ad85da084c00c32e0a12dd8c124d82fffe8117fc325a7325e2e9caf2e3e49a6ebed2cd5daf6d27b60e77
-
Filesize
346KB
MD55aa142c9e33d0c5d72f0fc4951e6c080
SHA1b20626787b7e3f16c2c8aa46489c60002be05b79
SHA256d0dbf9b445cc01f36e0d7b3483ade4479a2f1b54bf531716330b32b0d904d303
SHA512a8c9769fc98a8e867b0b5e8bd73fc602f906d63ead71ad85da084c00c32e0a12dd8c124d82fffe8117fc325a7325e2e9caf2e3e49a6ebed2cd5daf6d27b60e77
-
Filesize
3.5MB
MD52760f9a45e9e74c4eedfe9b0ee918e6b
SHA1277c62b14c987da3cf4c9e7d4ee4478cf61580c7
SHA25618827fed6ecd5e4d2c548dcad1eb21730a95f52b578bed75e3003b06a7390482
SHA51245aa5c7a51f644e82fc436029187fef542ee9a3be80ed8c3535c0383c938509f4d3f4414c97328430092bec1eed5a5105d47f45f36664f49c63a146b12a9fb7e
-
Filesize
3.5MB
MD52760f9a45e9e74c4eedfe9b0ee918e6b
SHA1277c62b14c987da3cf4c9e7d4ee4478cf61580c7
SHA25618827fed6ecd5e4d2c548dcad1eb21730a95f52b578bed75e3003b06a7390482
SHA51245aa5c7a51f644e82fc436029187fef542ee9a3be80ed8c3535c0383c938509f4d3f4414c97328430092bec1eed5a5105d47f45f36664f49c63a146b12a9fb7e