Analysis
-
max time kernel
173s -
max time network
179s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
21-12-2023 22:40
Static task
static1
Behavioral task
behavioral1
Sample
17a841e42f40423054ffebc9b5e61103.js
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
17a841e42f40423054ffebc9b5e61103.js
Resource
win10v2004-20231215-en
General
-
Target
17a841e42f40423054ffebc9b5e61103.js
-
Size
218KB
-
MD5
17a841e42f40423054ffebc9b5e61103
-
SHA1
8c51a8dcd3580b80ceb7b9d90d19853c77bcb3eb
-
SHA256
145f869eddd77064bf0238142318242b67d4b8f0d731595a2c85560696486ea6
-
SHA512
4a80a7b1905734e961a1d9e0210f77be62ca6f5002f2a7d5a2f755b4c23eb693ccea593a910bcb6c723f02e3f1f4c83dda07e8a710131b79fd2e41a558ecdc66
-
SSDEEP
3072:wYrEQw480xR5JClJsw4Kd9CPSqSgPCamwYBOz++ucpqH5PSfL2a5YgjTZctPUIw5:qQq0P5SGwrG6qBnpucpqZPoP5YKZTV
Malware Config
Signatures
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\huhTRxnPDW.js WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\huhTRxnPDW.js WScript.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\SEJOKAOI5S = "\"C:\\Users\\Admin\\AppData\\Roaming\\huhTRxnPDW.js\"" WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2692 wrote to memory of 2568 2692 wscript.exe 27 PID 2692 wrote to memory of 2568 2692 wscript.exe 27 PID 2692 wrote to memory of 2568 2692 wscript.exe 27 PID 2692 wrote to memory of 2788 2692 wscript.exe 28 PID 2692 wrote to memory of 2788 2692 wscript.exe 28 PID 2692 wrote to memory of 2788 2692 wscript.exe 28
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\17a841e42f40423054ffebc9b5e61103.js1⤵
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\huhTRxnPDW.js"2⤵
- Drops startup file
- Adds Run key to start application
PID:2568
-
-
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\uueqjczbb.txt"2⤵PID:2788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD5751a1e074de98bcbbf4bfc91cc6dcf7e
SHA1d225c87ba8d6e5d4ce0186b978801221c762e5e4
SHA2564d1c15c3b7a5f3b6d40947e82cb9f8f42235274ccf31b6cb3ae635b0fc2b7605
SHA512b55d3017d3386733c255652a682287082bb05508324db33b93dddaec7bed1c55e0488d9825c292c9a503f7c80e497d04ec1bc2233fa14d15692dfaa151bf54f5
-
Filesize
102KB
MD5d30db43fa4de3d1c86d88199fd218672
SHA1f87e903271b69f5dc3dc5b1da84dca781a838247
SHA256e3c140f5c4fa10ef365115cfa71f73b3a503313cf94068365472bb431e91e7e1
SHA512ba7a5fb9a375a5e1edaf9821d3de2d466a2649cfc4a690170c0c295b7b98fdad9577427a45f6938a7c4ecd827e7554e70175a36f4dfbeb2f7d25f8d22de707ca