Analysis
-
max time kernel
191s -
max time network
207s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22-12-2023 01:46
Static task
static1
Behavioral task
behavioral1
Sample
4b263027057b16a083bb8e409b8dbced.js
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4b263027057b16a083bb8e409b8dbced.js
Resource
win10v2004-20231215-en
General
-
Target
4b263027057b16a083bb8e409b8dbced.js
-
Size
199KB
-
MD5
4b263027057b16a083bb8e409b8dbced
-
SHA1
f4c761417c146343db7d305f60a3b370669fe8e5
-
SHA256
f251156124b27bd9de66f6cf4d17b234cae540a4737dfe95fb71602dfd738174
-
SHA512
38b3be25c0dc3a9aafa995a565bc9588741e3178ebe64bb95a07e2e3000f9900ebde4f5a5543a2d8688e29907fb392705a12fd6f6dc264b94fdaa3f4a128ba5f
-
SSDEEP
3072:Oaqiowk1T2FI5gt6SIIjX9IGLfm1Hri4+fJ5L/QBdc7EBHWB:ORi2Slg0jHCi4arL/Udc7EpWB
Malware Config
Signatures
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\jTtxtIjlOc.js WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\jTtxtIjlOc.js WScript.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\SEJOKAOI5S = "\"C:\\Users\\Admin\\AppData\\Roaming\\jTtxtIjlOc.js\"" WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2864 wrote to memory of 2648 2864 wscript.exe 29 PID 2864 wrote to memory of 2648 2864 wscript.exe 29 PID 2864 wrote to memory of 2648 2864 wscript.exe 29 PID 2864 wrote to memory of 2704 2864 wscript.exe 30 PID 2864 wrote to memory of 2704 2864 wscript.exe 30 PID 2864 wrote to memory of 2704 2864 wscript.exe 30
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\4b263027057b16a083bb8e409b8dbced.js1⤵
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\jTtxtIjlOc.js"2⤵
- Drops startup file
- Adds Run key to start application
PID:2648
-
-
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\ctzwwvbgdk.txt"2⤵PID:2704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD5468ec549c270898563a0d61e42a3bd17
SHA16bbd046226d2a87abd4e24d9831e029d97f5e0c7
SHA256ba97fd311dcae06ced279a1a5503252c7c0986a28e4168f0f96b4afcbcb7f79b
SHA512e9071cd00f5c12810e08655f9dedd740fa3052132467a1596056d986a505d980fde4a0bac0d9ff573b630fd0c5b4aeec05b878bd3d05c549e9745fe26dbc8039
-
Filesize
10KB
MD5aaf4029030e66fc5a1f728d1e45f506e
SHA1f8b00acf66797dac7e25faadbc7444faf15a225d
SHA2564de890877e6eea47f9667cc64c94493f81b63499fe9e5858a526da4617ded348
SHA512e708ee9596a830d180edd381c15a78efee06306ec23d6b2386fc666d1923ed3e61b6df9666ba0b70778048566dada9bd7bd9c551a4ffc555c46d7855a0e673c4