Analysis
-
max time kernel
287s -
max time network
289s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
20/03/2023, 22:32
Static task
static1
Behavioral task
behavioral1
Sample
update.js.zip
Resource
win10-20230220-en
General
-
Target
update.js.zip
-
Size
2KB
-
MD5
b46efe724ebb321a9626878c80595ace
-
SHA1
9e174cebb1efad2b42bea1f07294df35b5cad424
-
SHA256
94573626d8a55e36338c1c64269c4288d5822caf32d3a5fec3c943f47c22deb4
-
SHA512
dc659cc85d2f409d9692bfd1cbb603005b8ea39c9e587a000d2b616be8d7fe97e100b70b25ce06ea1c2a7ca1eb979d2c9b765130096d6b338958eb001fc0951f
Malware Config
Signatures
-
Blocklisted process makes network request 6 IoCs
flow pid Process 8 4044 WScript.exe 10 4044 WScript.exe 12 4044 WScript.exe 14 4044 WScript.exe 16 4044 WScript.exe 21 1636 WScript.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings OpenWith.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 708 NOTEPAD.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4376 OpenWith.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 4376 OpenWith.exe 4376 OpenWith.exe 4376 OpenWith.exe 4376 OpenWith.exe 4376 OpenWith.exe 4376 OpenWith.exe 4376 OpenWith.exe 4376 OpenWith.exe 4376 OpenWith.exe 4376 OpenWith.exe 4376 OpenWith.exe 4376 OpenWith.exe 4376 OpenWith.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4376 wrote to memory of 708 4376 OpenWith.exe 75 PID 4376 wrote to memory of 708 4376 OpenWith.exe 75
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\update.js.zip1⤵PID:372
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2328
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\update.js"1⤵
- Blocklisted process makes network request
PID:4044
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\update.js"1⤵
- Blocklisted process makes network request
PID:1636
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\update.js2⤵
- Opens file in notepad (likely ransom note)
PID:708
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_89854CA6A0F0936A4D2ECA78845CEA25
Filesize1KB
MD50e9bbbcdeeddd8a68974915da109faeb
SHA1db4f2364478d74de07496e798c6f3e69cf8bc2f6
SHA25627d8957473ad03207de3ea82b2693c6dc2991af29ed20f8217e82447cfab412e
SHA512704d2d093d78201044644c7851f2caa3090be500be53121a80d3b76ef506ed6ae780e3493e93ac2bfa6c73f3789190737eec69f4932a0e23249e4b43fa31ee2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\D0E1C4B6144E7ECAB3F020E4A19EFC29_03D1B482EE3032A122274428715A4E19
Filesize978B
MD50a686fb6d14c9a3c840060ae438eece6
SHA1ac0fe4983e34ffa395936cfe367589fe8cb81db0
SHA256fa1fa0514b252b4aa933b86a112cd93b73daa6f8e296dbd5a694babbe162a556
SHA5128f17577632a9daf9ee88d196b2a0e16e9a866bf44498a7dbd63257c8d4b257f5072c96bf9bb535c40659a8cb522e0261d17eb6f84c854425c78c1ef9b5bf4d48
-
Filesize
315B
MD586811750c814c99a2c8521b8d570ceb1
SHA153ff44c271c3709d11fec4c1983a5cb7c4c56d63
SHA256eed14ce504d74b60c7651f5aed5f3c99359a2c81aece867d106936476d2a8d58
SHA5122e7c389ebdef71679185fa031f68ad3d5b2d4b5cd78e1930fec67ece683569ad12fee77c5b3bfef1f2f942c322a048b875a21fd7ca44f522f7270315f6dffbdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_89854CA6A0F0936A4D2ECA78845CEA25
Filesize482B
MD537248a00ef40b5bb93a1bd786340da92
SHA1e46dea2632afa9b3d5b59507d1daeaed7f02b520
SHA256287a499acbd4b736157b6e91ca3856af74222655bdda1dfc67765ebe309a8f68
SHA5121284450e9defe003888ba729e7e06cd162737d08c78902d0564e4167540fba91ccb42547787b2678c3ba2157adf42f4473d9bc75f58b6de49df5cd808da24474
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\D0E1C4B6144E7ECAB3F020E4A19EFC29_03D1B482EE3032A122274428715A4E19
Filesize484B
MD5434f976d306976fb127144c17aff7d9f
SHA16dff8f998e00e38feb7a5074f81eb0ecc1f1de4e
SHA2563edec94be0c97c42328e41f977c2411cc467b366fd34338aa84c2d246d467ad2
SHA5123097f0ba5e7dcfb35a1571ba532c0365e2ba6c0ac43262aaaa5a69b2fecdb8b8628ebf264da247ab1bce63c58f395136fcceaad6b9d8c91da1e015369c9f5b6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DC0295DF88CEB332ABF57D83EC6C6170
Filesize512B
MD55f152b65da6a5a5b279df04e4604e2ba
SHA1fc5fb57329f466913df3b29cfdf1c17952f7cc31
SHA256bd1c53c53e1e2d3dca9ee167eb01b7c145f2813ea2bd65d093d7ab07841f1d54
SHA51296760253a0f03d6852cdd2aff2daace255e490e64235d503a8378569225a81e013b365f1a6dbbbf9609c7d2bb576b46072d28254f68ae56c4ec771e6d1cfe027