Analysis
-
max time kernel
579s -
max time network
584s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
27-08-2023 12:44
Static task
static1
Behavioral task
behavioral1
Sample
js-beautified-1.js
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
js-beautified-1.js
Resource
win10-20230703-en
Behavioral task
behavioral3
Sample
js-beautified-1.js
Resource
win10v2004-20230824-en
General
-
Target
js-beautified-1.js
-
Size
5KB
-
MD5
1758c6821ea484c0d5fb3aa1d947f011
-
SHA1
eaf96c77fa04d2bb6fdb571edfb256a4cc5e26f5
-
SHA256
76910decc28fb39ebd3b59a94fbb88d2aad13b4d87953ce6b9826877027d673d
-
SHA512
27e1fcdc0b55b332633fc7aa687887aa8fd2207163b656a06933103e05059d7b8aeb1b628fb40906282849b34f4554784607ed3008149207ab9f6731f2745725
-
SSDEEP
96:IRAsKzGMyfwNLqqvgJ0ADPHk3LtekmPswEzYszpWpkpGQwOGhTpq3OGhQGFmnXr7:fSMy0nAnPHk/mPJEzYs1gk4Qw/2cnXrD
Malware Config
Extracted
vjw0rm
http://sundayjs7250.duckdns.org:7250
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 2 3060 wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\js-beautified-1.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\js-beautified-1.js wscript.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3229013990-3330391637-2814184332-1000\Software\Microsoft\Windows\CurrentVersion\Run\0SRW0PGDYX = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\js-beautified-1.js\"" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).