Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12-10-2023 15:47
Static task
static1
Behavioral task
behavioral1
Sample
sample.js
Resource
win7-20230831-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
sample.js
Resource
win10v2004-20230915-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
sample.js
-
Size
28KB
-
MD5
b0568396b4ae8ac7ae6a8ceffae96bda
-
SHA1
02618eb78c56b57c39467bf329cecced2dc94279
-
SHA256
8479772dd8315eb3d9fe1c56592059bba27af48469c41ecfefab5f236d41e5f9
-
SHA512
831028a4fc7f2d47b4117835e3ba64cca79eb6ec90112e67da4d0ad3dad21e9652c6905fd77a6f3e5e99495bb2b8a5b1be8a0548bf116e07c8c6a11ddb778e78
-
SSDEEP
192:t7kI+DpAeNhiZfSZOMS1drwOfv1AZp4Xrit8p7Xj7V4h14nwq4SGaMaCh43yLqW6:t7kIcpAeNhiBTrdtCeJWCPDl
Score
10/10
Malware Config
Signatures
-
Blocklisted process makes network request 6 IoCs
flow pid Process 4 2020 wscript.exe 5 2020 wscript.exe 8 2020 wscript.exe 9 2020 wscript.exe 10 2020 wscript.exe 11 2020 wscript.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sample.js wscript.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Windows\CurrentVersion\Run\WMDQPHWOLO = "\"C:\\Users\\Admin\\AppData\\Roaming\\sample.js\"" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).