Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20230621-en -
resource tags
arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system -
submitted
27-06-2023 14:16
Static task
static1
Behavioral task
behavioral1
Sample
DhlAuthorisation0471js.js
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
DhlAuthorisation0471js.js
Resource
win10v2004-20230621-en
General
-
Target
DhlAuthorisation0471js.js
-
Size
2.7MB
-
MD5
eed1ebe93897be063de0e58e4727e202
-
SHA1
81d8a907c8b0c7aea595f19214588d14f8d34922
-
SHA256
ee4d4c17bf09054c1f23e7a41363a788c77e604b72360543a47c140b25e9e100
-
SHA512
be4395746b1b02af6262d65669c0d6df5228b84e960ee7c2f6dc30ef6aff8c49150235ab0bf1f2e4067a9236b0d95eeddb189c4ba368fb6d4ad2a11a5a9aaf19
-
SSDEEP
24576:nqCxdnXs0pApmfJL/SoAWQLE6/WXpVxzrO/J/HWVZBmqdYnV0tme/4lFOi51o39D:B
Malware Config
Signatures
-
Blocklisted process makes network request 16 IoCs
flow pid Process 9 1320 wscript.exe 10 656 wscript.exe 11 320 wscript.exe 15 320 wscript.exe 17 656 wscript.exe 18 1320 wscript.exe 21 320 wscript.exe 23 656 wscript.exe 24 1320 wscript.exe 26 320 wscript.exe 30 656 wscript.exe 32 1320 wscript.exe 34 320 wscript.exe 36 1320 wscript.exe 38 656 wscript.exe 40 320 wscript.exe -
Drops startup file 6 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lOtnWPJMDG.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DhlAuthorisation0471js.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DhlAuthorisation0471js.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lOtnWPJMDG.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lOtnWPJMDG.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lOtnWPJMDG.js wscript.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\DhlAuthorisation0471js = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\DhlAuthorisation0471js.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-3950455397-3229124517-1686476975-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3950455397-3229124517-1686476975-1000\Software\Microsoft\Windows\CurrentVersion\Run\DhlAuthorisation0471js = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\DhlAuthorisation0471js.js\"" wscript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\DhlAuthorisation0471js = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\DhlAuthorisation0471js.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-3950455397-3229124517-1686476975-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3950455397-3229124517-1686476975-1000\Software\Microsoft\Windows\CurrentVersion\Run\DhlAuthorisation0471js = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\DhlAuthorisation0471js.js\"" wscript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1840 wrote to memory of 1320 1840 wscript.exe 26 PID 1840 wrote to memory of 1320 1840 wscript.exe 26 PID 1840 wrote to memory of 1320 1840 wscript.exe 26 PID 1840 wrote to memory of 320 1840 wscript.exe 27 PID 1840 wrote to memory of 320 1840 wscript.exe 27 PID 1840 wrote to memory of 320 1840 wscript.exe 27 PID 320 wrote to memory of 656 320 wscript.exe 29 PID 320 wrote to memory of 656 320 wscript.exe 29 PID 320 wrote to memory of 656 320 wscript.exe 29
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\DhlAuthorisation0471js.js1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\lOtnWPJMDG.js"2⤵
- Blocklisted process makes network request
- Drops startup file
PID:1320
-
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\DhlAuthorisation0471js.js"2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\lOtnWPJMDG.js"3⤵
- Blocklisted process makes network request
- Drops startup file
PID:656
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5eed1ebe93897be063de0e58e4727e202
SHA181d8a907c8b0c7aea595f19214588d14f8d34922
SHA256ee4d4c17bf09054c1f23e7a41363a788c77e604b72360543a47c140b25e9e100
SHA512be4395746b1b02af6262d65669c0d6df5228b84e960ee7c2f6dc30ef6aff8c49150235ab0bf1f2e4067a9236b0d95eeddb189c4ba368fb6d4ad2a11a5a9aaf19
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DhlAuthorisation0471js.js
Filesize2.7MB
MD5eed1ebe93897be063de0e58e4727e202
SHA181d8a907c8b0c7aea595f19214588d14f8d34922
SHA256ee4d4c17bf09054c1f23e7a41363a788c77e604b72360543a47c140b25e9e100
SHA512be4395746b1b02af6262d65669c0d6df5228b84e960ee7c2f6dc30ef6aff8c49150235ab0bf1f2e4067a9236b0d95eeddb189c4ba368fb6d4ad2a11a5a9aaf19
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DhlAuthorisation0471js.js
Filesize2.7MB
MD5eed1ebe93897be063de0e58e4727e202
SHA181d8a907c8b0c7aea595f19214588d14f8d34922
SHA256ee4d4c17bf09054c1f23e7a41363a788c77e604b72360543a47c140b25e9e100
SHA512be4395746b1b02af6262d65669c0d6df5228b84e960ee7c2f6dc30ef6aff8c49150235ab0bf1f2e4067a9236b0d95eeddb189c4ba368fb6d4ad2a11a5a9aaf19
-
Filesize
346KB
MD5cf607336b51230f951c58662b5a1f5ce
SHA14415bc64be744d850ab85645b125794e85febff8
SHA256b24957bc6b75d6b95b90e3dda12c8afe989a3a6b8e59dd418c0afc781267f202
SHA5125520b012a1aa77b7a5b69d925e60ecab26e3ad83230ec5deea0254b26493bb1a1c9b9fc2aa8e786f21470fd0f5cde57473379b0edbeaf6e5d40a79ae7b7ffba5
-
Filesize
346KB
MD5cf607336b51230f951c58662b5a1f5ce
SHA14415bc64be744d850ab85645b125794e85febff8
SHA256b24957bc6b75d6b95b90e3dda12c8afe989a3a6b8e59dd418c0afc781267f202
SHA5125520b012a1aa77b7a5b69d925e60ecab26e3ad83230ec5deea0254b26493bb1a1c9b9fc2aa8e786f21470fd0f5cde57473379b0edbeaf6e5d40a79ae7b7ffba5