Analysis
-
max time kernel
136s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
31/05/2023, 12:43
Static task
static1
Behavioral task
behavioral1
Sample
02575799.js
Resource
win7-20230220-en
0 signatures
150 seconds
Behavioral task
behavioral2
Sample
02575799.js
Resource
win10v2004-20230220-en
3 signatures
150 seconds
General
-
Target
02575799.js
-
Size
4KB
-
MD5
68ea9e0afed17600ec1030ca7f28a916
-
SHA1
88c1dae12a91ce684007f85137db86d86071a3c0
-
SHA256
4f08565bb4bd62b4ca4e09bba060b0d18927f7c684ab4f0f757cb6cfef1aa860
-
SHA512
bfdcc200a6d683c7edabd67a50494fc9279ca38dd062bc1ae99178aa782012f6b61e97d35e69bc4dbbc99e227fdffce86ab6d9cbd10d81993735c7d5fdc47141
-
SSDEEP
96:rExLYMzMYFWdCYFXlYFXaYFXoUYFX2sYFXTQTIFm3k07/yxJ:GU9ZqZ1ZYZMZTQiqs
Score
10/10
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2236 4200 conhost.exe 36 -
Blocklisted process makes network request 1 IoCs
flow pid Process 5 4908 wscript.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2236 wrote to memory of 3132 2236 conhost.exe 93 PID 2236 wrote to memory of 3132 2236 conhost.exe 93 PID 3132 wrote to memory of 3732 3132 conhost.exe 94 PID 3132 wrote to memory of 3732 3132 conhost.exe 94 PID 3732 wrote to memory of 2812 3732 conhost.exe 95 PID 3732 wrote to memory of 2812 3732 conhost.exe 95
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\02575799.js1⤵
- Blocklisted process makes network request
PID:4908
-
C:\Windows\system32\conhost.execonhost.exe conhost.exe conhost.exe rundll32.exe C:\Users\Public\objective.dat,next1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\system32\conhost.execonhost.exe conhost.exe rundll32.exe C:\Users\Public\objective.dat,next2⤵
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Windows\system32\conhost.execonhost.exe rundll32.exe C:\Users\Public\objective.dat,next3⤵
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Public\objective.dat,next4⤵PID:2812
-
-
-