Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
15-06-2023 08:05
Static task
static1
Behavioral task
behavioral1
Sample
VQlpXNzQJz.js
Resource
win7-20230220-en
4 signatures
150 seconds
General
-
Target
VQlpXNzQJz.js
-
Size
346KB
-
MD5
3ed07b2cfc14457c448129ac338d1a9b
-
SHA1
e07cd37475c0a9e2c53d4f7df317c8b4be70855e
-
SHA256
ed505690251f92f79fb3341968a3283e69bcd4ffe08539593b1601fac515c36b
-
SHA512
db34f63ad7cd4580c200040f1ced68ef7477cf61e44304932a2989cda520a56e90bf51d27bcd8474f14600a92f25664befa9a64caf26c009d5ecb6a610b78fa5
-
SSDEEP
6144:eQfPBx5q0sQ1o7rsbHC01mDBpNW2mTMSbpuV8l/:eQ3B7qgpr
Malware Config
Signatures
-
Blocklisted process makes network request 17 IoCs
flow pid Process 11 4132 wscript.exe 22 4132 wscript.exe 27 4132 wscript.exe 38 4132 wscript.exe 39 4132 wscript.exe 41 4132 wscript.exe 45 4132 wscript.exe 48 4132 wscript.exe 49 4132 wscript.exe 53 4132 wscript.exe 54 4132 wscript.exe 55 4132 wscript.exe 57 4132 wscript.exe 58 4132 wscript.exe 60 4132 wscript.exe 61 4132 wscript.exe 63 4132 wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\VQlpXNzQJz.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\VQlpXNzQJz.js wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).