Analysis
-
max time kernel
140s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2023, 07:51
Static task
static1
Behavioral task
behavioral1
Sample
File.js
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
File.js
Resource
win10v2004-20230703-en
General
-
Target
File.js
-
Size
354KB
-
MD5
56cdaacd1ad2f15d39329d2228faf410
-
SHA1
a458ff2092cb22bff8841d099993a693481f893a
-
SHA256
43042751e19dca0c882b05dd29e02a1b4ed2453f8c482f016054256690788df8
-
SHA512
fcbf868dfe1cbc8ee09a9af4ccdac6490fad14c9ee149f8efa0076ae088cf4dd18ffe41c2fd998b071734c512b79e480a33de38bbd192dad09a56d2c8cb7e547
-
SSDEEP
6144:qzIw9dIB6UmEBa7ydz8fy3h51wVhlC1ZuSSQxIEcoYVidGQKL9PEAJ:8laN8q151wVhwLSKqs1YPEg
Malware Config
Signatures
-
Drops file in Program Files directory 12 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\symbols\dll\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\server\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\dll\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\symbols\dll\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\server\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\server\symbols\dll\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\dll\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\server\dll\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\server\symbols\dll\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\server\dll\ntdll.pdb javaw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1020 wrote to memory of 1304 1020 wscript.exe 82 PID 1020 wrote to memory of 1304 1020 wscript.exe 82
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\File.js1⤵
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe"C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\dgwaoy.txt"2⤵
- Drops file in Program Files directory
PID:1304
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
164KB
MD5e8639424cdaefdbc6cadba38b5c3b711
SHA137f1e654f64726e94de6539b20c6382c71aac93f
SHA256ab6f8c51d1f15a18cd23e1ad5a34c82c83746befb7d11cce2860c971be35adaa
SHA512b520f723016f8ceb0713afe3a8ead594dfd0c8617fe3d535c9e68dd16a7914d146a51213a9caaa3dce5b3ca4fd4247a6a3f03b2c4f82ccf10886bef1257a9fdc