Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
23-10-2023 10:11
Static task
static1
Behavioral task
behavioral1
Sample
bdb89a48813d653020c80002b9993bf9e499200860f7158b4d252daa12cbb1db.js
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
bdb89a48813d653020c80002b9993bf9e499200860f7158b4d252daa12cbb1db.js
Resource
win10v2004-20231020-en
General
-
Target
bdb89a48813d653020c80002b9993bf9e499200860f7158b4d252daa12cbb1db.js
-
Size
5KB
-
MD5
cb4d973520751a756027af396ef263fb
-
SHA1
c6d0ac4edf12a65eedbbe387d8add54a7c0798ae
-
SHA256
bdb89a48813d653020c80002b9993bf9e499200860f7158b4d252daa12cbb1db
-
SHA512
2ac46c69347e7c093c6fd7044cbf543193afaac790626410db98d0ec1020ff39e4b0eab0d3070380c0e4d5409547ef5530b035970e29cbbbef97b098f58fb9e7
-
SSDEEP
96:SABNo5Dyk2c24ZRMHXE6/BIL+Ys+fJ/nDdQqR7bJyKUxvUu/ingHXRZfzYMe/jFT:zSz2c24ZRMlBIaYs+fJ7fRfWingHXRZe
Malware Config
Extracted
vjw0rm
http://172.245.244.118:7070
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 5 5036 wscript.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bdb89a48813d653020c80002b9993bf9e499200860f7158b4d252daa12cbb1db.js wscript.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1511405631-3522522280-778892991-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\I28OWGQ8IA = "\"C:\\Users\\Admin\\AppData\\Roaming\\bdb89a48813d653020c80002b9993bf9e499200860f7158b4d252daa12cbb1db.js\"" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).