Analysis

  • max time kernel
    121s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    07/11/2023, 08:22

General

  • Target

    history 51333445.js

  • Size

    1.0MB

  • MD5

    231bb49896be433c5fd473954dfabcc2

  • SHA1

    6cf31003e2edb634edbd98eb7e3d893e7cfb4ab5

  • SHA256

    0fe0b384d29d473df31ea32dab160d08f1bb890424dc0ffbfc435200160f84e3

  • SHA512

    955e15f694151cf2e81695ba746d4be9da76aa0d834f64239aa1b20a88434d85cc7a64c338909f0109d340da2471a1bf6d4f40c72ab89ba2a3bf58efbb7dbefb

  • SSDEEP

    96:NpGzkX2pX/sksLWRuBsfl03QcTiCaJxs3Eaq33aD2:iAUX/sxWROsfl03Qc6xsQt

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe "C:\Users\Admin\AppData\Local\Temp\history 51333445.js"
    1⤵
    • Blocklisted process makes network request
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:2220
    • C:\Windows\system32\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\suc11.05.2016kit.bat" "
      2⤵
        PID:2840

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      ad3734b33cf9368b1bb174236a6bacfc

      SHA1

      211849b4433b87d8905d4a8aac16c21c62cb865f

      SHA256

      ddb05f6efb3e9cb3cc25bc5d5db44b2822313220a957cd51485266945602b1ad

      SHA512

      92ab2852c1e202c27a12873fa1c36861a8ab6f07664b496f14c51b45ce717027cb967652a7dea56fb8211b28637a7d491dde51e88763db09badfb85cba0cd37a

    • C:\Users\Admin\AppData\Local\Temp\Cab5D10.tmp

      Filesize

      61KB

      MD5

      f3441b8572aae8801c04f3060b550443

      SHA1

      4ef0a35436125d6821831ef36c28ffaf196cda15

      SHA256

      6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

      SHA512

      5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

    • C:\Users\Admin\AppData\Local\Temp\Tar5DDE.tmp

      Filesize

      163KB

      MD5

      9441737383d21192400eca82fda910ec

      SHA1

      725e0d606a4fc9ba44aa8ffde65bed15e65367e4

      SHA256

      bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

      SHA512

      7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

    • C:\Users\Admin\AppData\Local\Temp\suc11.05.2016kit.bat

      Filesize

      66B

      MD5

      c0c7706a865514fb7636604916017a86

      SHA1

      4cd9a6037b6065fcc95ba016d76ef4c002d612a7

      SHA256

      99e15a253fcf4d24126f0ff7327c983f88525cf4934cf78d4e7cc74873940828

      SHA512

      2b25db9f0ec9c7745c7aa311397d20f92f3bad547dc74382916e88738853c9872da30c81feaeddb31b7591ab6fcabde79f08589f149ddb3c5985e284a143d36e

    • C:\Users\Admin\AppData\Local\Temp\suc11.05.2016kit.bat

      Filesize

      66B

      MD5

      c0c7706a865514fb7636604916017a86

      SHA1

      4cd9a6037b6065fcc95ba016d76ef4c002d612a7

      SHA256

      99e15a253fcf4d24126f0ff7327c983f88525cf4934cf78d4e7cc74873940828

      SHA512

      2b25db9f0ec9c7745c7aa311397d20f92f3bad547dc74382916e88738853c9872da30c81feaeddb31b7591ab6fcabde79f08589f149ddb3c5985e284a143d36e