Analysis

  • max time kernel
    37s
  • max time network
    100s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    14/06/2023, 11:56

General

  • Target

    docu_FD962_Jun_14_1.js

  • Size

    5KB

  • MD5

    0eaf361ad56c09f4e6d5a0dbabe88d8a

  • SHA1

    43162b704cc59c2da79e799fc11ddcc700ef6dcf

  • SHA256

    2a00770280b07e2291d41e1480b8549b08e82f30297e271373a0a3628d547427

  • SHA512

    e8c28666975e3e2588dd66799e108903b6b81f6a9f52463982a56d6a5e5d4609328b58c02dc74e0d996b3fd147771a86f8454a002d05c6c362dc4881aebad2f4

  • SSDEEP

    96:YRMKGaZP8PxzjgNyQ6CDvdt41+LTsLT7LTqt41bdrCOeJn2RCx6Fe62RCKl4a:Yy8UQ6KdXEjCsKG+4a

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\docu_FD962_Jun_14_1.js
    1⤵
    • Blocklisted process makes network request
    • Suspicious use of WriteProcessMemory
    PID:1284
    • C:\Windows\System32\conhost.exe
      "C:\Windows\System32\conhost.exe" rundll32.exe c:\users\public\underseller.tmp,must
      2⤵
        PID:1816

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1284-67-0x0000000002380000-0x0000000002381000-memory.dmp

      Filesize

      4KB

    • memory/1284-68-0x0000000002380000-0x0000000002381000-memory.dmp

      Filesize

      4KB