Analysis
-
max time kernel
562s -
max time network
567s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
27-08-2023 12:40
Static task
static1
Behavioral task
behavioral1
Sample
js-debloated-1.js
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
js-debloated-1.js
Resource
win10-20230703-en
Behavioral task
behavioral3
Sample
js-debloated-1.js
Resource
win10v2004-20230703-en
General
-
Target
js-debloated-1.js
-
Size
6KB
-
MD5
cc6c91ddaed3c86e49ad873972f021a6
-
SHA1
e48c72c049455ca0d58c7cd4828807cc59b7ce43
-
SHA256
8a5a47aa6aa42919f05c32ff57036c4d7fc7adf4e6d43a256ad0bde223644504
-
SHA512
2f9254368b6fa4ee3106ec52350e75f84bbbcc4e6e044c8a9304af6bf16cc98305da80655848134f970542684d017e222d5ae10359e9ade81b21c562689c8052
-
SSDEEP
192:oZVhRdS232ZSLuXTqwhVScjNYkJ+cDUz8++pZ:qVd5uXTqw3ScZYjPANpZ
Malware Config
Extracted
vjw0rm
http://sundayjs7250.duckdns.org:7250
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 2 5068 wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\js-debloated-1.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\js-debloated-1.js wscript.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1148472871-1113856141-1322182616-1000\Software\Microsoft\Windows\CurrentVersion\Run\0SRW0PGDYX = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\js-debloated-1.js\"" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).