Resubmissions
28-06-2023 15:36
230628-s1v9jsbb5v 428-06-2023 15:14
230628-smjzcsba9w 528-06-2023 14:47
230628-r5x39saa64 1Analysis
-
max time kernel
255s -
max time network
259s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
28-06-2023 14:47
Static task
static1
Behavioral task
behavioral1
Sample
f_0076d0.js
Resource
win7-20230621-en
windows7-x64
0 signatures
300 seconds
Behavioral task
behavioral2
Sample
f_0076d0.js
Resource
win10v2004-20230621-en
windows10-2004-x64
5 signatures
300 seconds
General
-
Target
f_0076d0.js
-
Size
35KB
-
MD5
2ecbe272a31befb5fb4cef797f08809f
-
SHA1
7aeaf15cb3534a69aad834ec47da0a57ca454eec
-
SHA256
80351dba116819f679547775b760ecda97aa51bc42e703716c66383bcce7d6ac
-
SHA512
4470c79d14201f8c5b0c36afc068dc71dad8b60e88c070320eff3954533087fa93e8955a66203a5b03d902a63b71c0d4755e004e97bc7c3b2c0233ccf265edbd
-
SSDEEP
768:XRthFKqBcSwFRPDABPr1TNaD6CZ92zdk4Qji:PCATwDyj1TNaD6CZ92zdk4Qji
Score
1/10
Malware Config
Signatures
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2178924671-3779044592-2825503497-1000_Classes\Local Settings OpenWith.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 4632 NOTEPAD.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2228 OpenWith.exe -
Suspicious use of SetWindowsHookEx 47 IoCs
pid Process 2228 OpenWith.exe 2228 OpenWith.exe 2228 OpenWith.exe 2228 OpenWith.exe 2228 OpenWith.exe 2228 OpenWith.exe 2228 OpenWith.exe 2228 OpenWith.exe 2228 OpenWith.exe 2228 OpenWith.exe 2228 OpenWith.exe 2228 OpenWith.exe 2228 OpenWith.exe 2228 OpenWith.exe 2228 OpenWith.exe 2228 OpenWith.exe 2228 OpenWith.exe 2228 OpenWith.exe 2228 OpenWith.exe 2228 OpenWith.exe 2228 OpenWith.exe 2228 OpenWith.exe 2228 OpenWith.exe 2228 OpenWith.exe 2228 OpenWith.exe 2228 OpenWith.exe 2228 OpenWith.exe 2228 OpenWith.exe 2228 OpenWith.exe 2228 OpenWith.exe 2228 OpenWith.exe 2228 OpenWith.exe 2228 OpenWith.exe 2228 OpenWith.exe 2228 OpenWith.exe 2228 OpenWith.exe 2228 OpenWith.exe 2228 OpenWith.exe 2228 OpenWith.exe 2228 OpenWith.exe 2228 OpenWith.exe 2228 OpenWith.exe 2228 OpenWith.exe 2228 OpenWith.exe 2228 OpenWith.exe 2228 OpenWith.exe 2228 OpenWith.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2228 wrote to memory of 4632 2228 OpenWith.exe 93 PID 2228 wrote to memory of 4632 2228 OpenWith.exe 93
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\f_0076d0.js1⤵PID:4412
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1192
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\f_0076d0.js2⤵
- Opens file in notepad (likely ransom note)
PID:4632
-