Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
26-03-2023 07:26
Static task
static1
Behavioral task
behavioral1
Sample
Shipping_Details.js
Resource
win7-20230220-en
General
-
Target
Shipping_Details.js
-
Size
9.2MB
-
MD5
c72d738747f68d4f8d9e9368e47928bf
-
SHA1
00b523b2e3ab0f2bfd7d4aabf3b1c33ae390c585
-
SHA256
06b94b3ec86bd4a61888848f379808954de1ff2a1fe471edcfa312f5e9ba2ab5
-
SHA512
1a01baa0c813b928cf5dfe456f76acdcf9be0e0df8a6131e248f9aa5456c65a69cb9809efe56afc4db32cfeeb93ca42e3319f1e53689ba4ed23b77911b802c61
-
SSDEEP
3072:gNK8RjR/R8x/xqm2O1IrWa7Mjv/GnOv3GmPLjCKKIz9vs2J96i/OBDVOdz83Pm7+:I
Malware Config
Signatures
-
Blocklisted process makes network request 4 IoCs
flow pid Process 4 992 WScript.exe 8 992 WScript.exe 15 992 WScript.exe 17 992 WScript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\oUvEoxxwKv.js WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\oUvEoxxwKv.js WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1244 wrote to memory of 992 1244 wscript.exe 28 PID 1244 wrote to memory of 992 1244 wscript.exe 28 PID 1244 wrote to memory of 992 1244 wscript.exe 28 PID 1244 wrote to memory of 320 1244 wscript.exe 29 PID 1244 wrote to memory of 320 1244 wscript.exe 29 PID 1244 wrote to memory of 320 1244 wscript.exe 29
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\Shipping_Details.js1⤵
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\oUvEoxxwKv.js"2⤵
- Blocklisted process makes network request
- Drops startup file
PID:992
-
-
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\zscysavtg.txt"2⤵PID:320
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5b7e9c8bac9afc434944605c2422e1ad0
SHA1a653b478be92ecbd848bf79e175c454ebb9ccf21
SHA256be481241ae35aed859e1b558e23fcf640e0ec5f36d1e993a085ccc499b62c465
SHA512b790f27cce05ee3c754728489c8912501dc5c61d00639db760957697e3ea28855a81ce38634ddf2d98bf865055977c4d5dd2faaecc3a625eb090012161df2190
-
Filesize
164KB
MD5ec5e12b3ea2318692c2d2b74c33dfbda
SHA1f7f6c3d3e266c7a85ec489389d5508eaa1983055
SHA256056579d3948044c01ffa21dd8a14f7c4109efd25e609055e24a37cb6db603ef7
SHA5120c91246971bb23ba3801b348ca8148c048de43c4caa7912b681868e471f5a0f080f2969e8fda1b04a002a81b403bddb22b62496b8eee75814cb691391ad5851a