Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22-12-2023 13:18
Static task
static1
Behavioral task
behavioral1
Sample
9e872de7115891e5eea6c64be9164ad9.js
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9e872de7115891e5eea6c64be9164ad9.js
Resource
win10v2004-20231215-en
General
-
Target
9e872de7115891e5eea6c64be9164ad9.js
-
Size
195KB
-
MD5
9e872de7115891e5eea6c64be9164ad9
-
SHA1
c279eb494fbf5cd0a398fb02c4b10e8728b4198b
-
SHA256
019a6c3f10ef4440d4c08462eaca4acca8f58e16bc375c0483336368bc919457
-
SHA512
b9d651f7f4bc7edbd4f66c0acad209bcbc3268a648a02cff5b19b5f30eafe2c6e1ade7ce617f4b16433585cf3aa3f13a25f665a7541371af0e587c2a472453db
-
SSDEEP
3072:WY+n3QxmgBp64aCMyf1m67IYGP8RLI/VvsY4h34VruWwuUwWrFPv5:63y7Meh7gP3uTh34VrhwuVWrFPv5
Malware Config
Signatures
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cTmNhYTLpQ.js WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cTmNhYTLpQ.js WScript.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Run\SEJOKAOI5S = "\"C:\\Users\\Admin\\AppData\\Roaming\\cTmNhYTLpQ.js\"" WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1996 wrote to memory of 2268 1996 wscript.exe 28 PID 1996 wrote to memory of 2268 1996 wscript.exe 28 PID 1996 wrote to memory of 2268 1996 wscript.exe 28 PID 1996 wrote to memory of 2840 1996 wscript.exe 29 PID 1996 wrote to memory of 2840 1996 wscript.exe 29 PID 1996 wrote to memory of 2840 1996 wscript.exe 29
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\9e872de7115891e5eea6c64be9164ad9.js1⤵
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\cTmNhYTLpQ.js"2⤵
- Drops startup file
- Adds Run key to start application
PID:2268
-
-
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\bcuzmwbd.txt"2⤵PID:2840
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD5468ec549c270898563a0d61e42a3bd17
SHA16bbd046226d2a87abd4e24d9831e029d97f5e0c7
SHA256ba97fd311dcae06ced279a1a5503252c7c0986a28e4168f0f96b4afcbcb7f79b
SHA512e9071cd00f5c12810e08655f9dedd740fa3052132467a1596056d986a505d980fde4a0bac0d9ff573b630fd0c5b4aeec05b878bd3d05c549e9745fe26dbc8039
-
Filesize
9KB
MD5685b1b2952c8efe8584d692840416ebb
SHA1d52696d12e7aa7b5c3757bfc0d524e11a527edba
SHA256a0468409b7c7800ce0b1df997097525357bb2b93686afba5e5f82dd03667c00c
SHA5127b173df0ef8b2045f65980e2ea657a544551b4809eb6d82b5eed829e5858fab4966e500912f193d2a6382974f2d1c775a93454f562a6a826d6a191dec7f39868