Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
13/06/2023, 08:01 UTC
Static task
static1
Behavioral task
behavioral1
Sample
ACCOUNTS_SATATEMENT__2023-0614.js
Resource
win7-20230220-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
ACCOUNTS_SATATEMENT__2023-0614.js
Resource
win10v2004-20230220-en
5 signatures
150 seconds
General
-
Target
ACCOUNTS_SATATEMENT__2023-0614.js
-
Size
6KB
-
MD5
28207514dfbe2e049fa6ba1fe6fe978c
-
SHA1
31944447fce1bd818fcdbce1990e90590a512966
-
SHA256
9e30af630ba15f719d8c377e3a8a99a5c98213fd1a81f2d7895f426b53edf407
-
SHA512
04d1e1b6d35660b831bf945e9777ae55fa4101199be54c4b22bff01a462855e1e09994924248297ec2cf7f86a4a0be0156ff66cd7d0ad0ff028268232ecf6a7b
-
SSDEEP
96:2ZH1uyLoXI6PoXT2lcJc9hEOHOVSbgZ2BwuxXV8292ZrYEboyYywOLKiHe4TmOMy:2ZVh1VsO292ZM6DLKElsAVUh8AsX
Score
10/10
Malware Config
Signatures
-
Blocklisted process makes network request 6 IoCs
flow pid Process 8 4144 wscript.exe 40 4144 wscript.exe 49 4144 wscript.exe 54 4144 wscript.exe 56 4144 wscript.exe 59 4144 wscript.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ACCOUNTS_SATATEMENT__2023-0614.js wscript.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Windows\CurrentVersion\Run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RCGLSQK375 = "\"C:\\Users\\Admin\\ACCOUNTS_SATATEMENT__2023-0614.js\"" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
Processes
Network
-
Remote address:8.8.8.8:53Request97.17.167.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestcorewo4romocm.duckdns.orgIN AResponsecorewo4romocm.duckdns.orgIN A94.200.95.128
-
Remote address:8.8.8.8:53Request240.221.184.93.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request68.32.126.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request183.59.114.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request123.108.74.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request28.118.140.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request183.59.114.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request240.232.18.117.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request8.9.0.a.e.e.f.b.0.0.0.0.0.0.0.0.5.0.0.0.0.0.8.0.0.3.0.1.3.0.6.2.ip6.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request86.8.109.52.in-addr.arpaIN PTRResponse
-
260 B 5
-
260 B 5
-
260 B 5
-
322 B 7
-
322 B 7
-
260 B 5
-
322 B 7
-
322 B 7
-
322 B 7
-
260 B 5
-
260 B 5
-
260 B 5
-
260 B 5
-
260 B 5
-
208 B 4
-
208 B 4
-
71 B 145 B 1 1
DNS Request
97.17.167.52.in-addr.arpa
-
71 B 87 B 1 1
DNS Request
corewo4romocm.duckdns.org
DNS Response
94.200.95.128
-
73 B 144 B 1 1
DNS Request
240.221.184.93.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
68.32.126.40.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
183.59.114.20.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
123.108.74.40.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
28.118.140.52.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
183.59.114.20.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
240.232.18.117.in-addr.arpa
-
118 B 204 B 1 1
DNS Request
8.9.0.a.e.e.f.b.0.0.0.0.0.0.0.0.5.0.0.0.0.0.8.0.0.3.0.1.3.0.6.2.ip6.arpa
-
70 B 144 B 1 1
DNS Request
86.8.109.52.in-addr.arpa