Analysis
-
max time kernel
456s -
max time network
516s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2023 12:54
Static task
static1
Behavioral task
behavioral1
Sample
Mi3873653.js
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Mi3873653.js
Resource
win10-20230915-en
Behavioral task
behavioral3
Sample
Mi3873653.js
Resource
win10v2004-20230915-en
General
-
Target
Mi3873653.js
-
Size
300.0MB
-
MD5
eb87c0978863c945b3a63e2d381adb53
-
SHA1
792a1332160d24394ced681d4fc0e9b58a0e3377
-
SHA256
40d56bd4eaf6c81e0e6ad44c8a67e9f01edc3a437044d6018613a5d6ed0b01e3
-
SHA512
0224bb5b69044186ff1d81022d8c4a71ebb1c7cc791a53183d1eaee477a019bb0d86d033cad05d627351dbb0b36c6b7bb7c8e4fbc5a164be0d4c1e2046f2cc0b
-
SSDEEP
192:nlu4lgWWzi75WbAZv61hdh12cB5kw94tMa3dZYkVdPrv1kc8uIVLk5/lWWWnazci:chWWz5K0y24jHuUqWWRIHKSqm
Malware Config
Signatures
-
Blocklisted process makes network request 4 IoCs
flow pid Process 68 3080 wscript.exe 79 3080 wscript.exe 85 3080 wscript.exe 88 3080 wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Mi3873653.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Mi3873653.js wscript.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ALFSRZY2AJ = "'C:\\Users\\Admin\\AppData\\Local\\Temp\\Mi3873653.js'" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).