Analysis

  • max time kernel
    597s
  • max time network
    601s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    31-05-2023 15:46

General

  • Target

    Bank_Credit_authorization_letter_pdf.js

  • Size

    237KB

  • MD5

    244939587914af01d24ef6a3e14581af

  • SHA1

    45ec0fb28d93363e9e17818bc7cfaafdc3c680b1

  • SHA256

    b9ecbdc46ba03daf23a6b2c0a32b6c950bef2d1d4ab967dcf901d65a48e835fb

  • SHA512

    1bd8d0a00dc70936e2238115b41da10f791819e19c6582810132fa8cfca478264a867bdc1f65db278c75358aa7b21b304ac0b9f0aa7d72d0a09080008205ad4e

  • SSDEEP

    3072:MhYgNripx58ev3jK5Kk00LvVPdTg9r2e9XSg6ZSjglFfgKCuAQkvXI0:MEx5jv324tYvtdTUNsxZ9lFoKCuAlXl

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 64 IoCs
  • Drops startup file 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\Bank_Credit_authorization_letter_pdf.js
    1⤵
    • Blocklisted process makes network request
    • Drops startup file
    PID:1596

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Bank_Credit_authorization_letter_pdf.js

    Filesize

    237KB

    MD5

    244939587914af01d24ef6a3e14581af

    SHA1

    45ec0fb28d93363e9e17818bc7cfaafdc3c680b1

    SHA256

    b9ecbdc46ba03daf23a6b2c0a32b6c950bef2d1d4ab967dcf901d65a48e835fb

    SHA512

    1bd8d0a00dc70936e2238115b41da10f791819e19c6582810132fa8cfca478264a867bdc1f65db278c75358aa7b21b304ac0b9f0aa7d72d0a09080008205ad4e