Analysis
-
max time kernel
172s -
max time network
181s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22-12-2023 13:16
Static task
static1
Behavioral task
behavioral1
Sample
9da6b45d17e4c0ef80df356e1a7e6bdf.js
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9da6b45d17e4c0ef80df356e1a7e6bdf.js
Resource
win10v2004-20231215-en
General
-
Target
9da6b45d17e4c0ef80df356e1a7e6bdf.js
-
Size
200KB
-
MD5
9da6b45d17e4c0ef80df356e1a7e6bdf
-
SHA1
5bf501a2ce339671a28d1ecea943c5bb817962b6
-
SHA256
1d61ac748d5d297ca8fa771d12a1c79626c6e2c217a8a349b4ade54c09ae589b
-
SHA512
f4249a1bc09eff66e058a736cbae688c6f7a56391f0fdaaca0056a94098442761e12022c10870a8a5cac99d6af51daab747244bb4dfbc33a89fef1f74f12a788
-
SSDEEP
3072:cXYHwujfPHfCjTutr4QMuHNjmvXSG7H+jJbE2bve+5OsF1S4PM:A+f/fCnKr4PcNjmviGEC2bb1H5M
Malware Config
Signatures
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\otOJexNvvn.js WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\otOJexNvvn.js WScript.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\SEJOKAOI5S = "\"C:\\Users\\Admin\\AppData\\Roaming\\otOJexNvvn.js\"" WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2888 wrote to memory of 2832 2888 wscript.exe 27 PID 2888 wrote to memory of 2832 2888 wscript.exe 27 PID 2888 wrote to memory of 2832 2888 wscript.exe 27 PID 2888 wrote to memory of 2848 2888 wscript.exe 28 PID 2888 wrote to memory of 2848 2888 wscript.exe 28 PID 2888 wrote to memory of 2848 2888 wscript.exe 28
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\9da6b45d17e4c0ef80df356e1a7e6bdf.js1⤵
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\otOJexNvvn.js"2⤵
- Drops startup file
- Adds Run key to start application
PID:2832
-
-
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\dlugutrydr.txt"2⤵PID:2848
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD506f61cd3d0cdf9257fcdac6483d4c1ba
SHA1f4eec20fdbc68dbdd8bb5fd1dfecd918b099ef2f
SHA256424ba40767618afade696d3714c1ba1960ff91e3bc1658fa510cd2332baf2a2f
SHA5129aa7d19fb9999d0414d2399e14ccf43b66cbd6a1bf54be6538b6a0a9e9ac096bdc065a43e4d776ed5cd01a14562446fcd535979b0756781e132e13b27b575657
-
Filesize
9KB
MD5730e1246285921eac566caa6a0c9b663
SHA12e508ef96d92608971061ff76b520f141a049e78
SHA256aba5bc2432ee098aa4a30e4310ee1a300db7bb28dd4220ebc47f17aed7a17413
SHA5120524474a34a89b4eafb375567b82229f0551e5aedc5ba8b9475397d395370ec84499ff7bcd1dd0698e5ea7300a27560eaeec0824ebc3edc49267326ee843b281