Analysis
-
max time kernel
149s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22-12-2023 13:28
Static task
static1
Behavioral task
behavioral1
Sample
a3b2ac28fb71d8461b6c90327fabb5a1.js
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
a3b2ac28fb71d8461b6c90327fabb5a1.js
Resource
win10v2004-20231215-en
General
-
Target
a3b2ac28fb71d8461b6c90327fabb5a1.js
-
Size
904KB
-
MD5
a3b2ac28fb71d8461b6c90327fabb5a1
-
SHA1
033bf48edff207df74d6b78410040f391750db8f
-
SHA256
e33df6ad1c1f683b5fe7dd5edfe1d0f9e246ab41364b3f6ae297e717a5ff8026
-
SHA512
4174fd12ac86611280ffb1c3afaffbeb1c888f7835747738dba38cce5c75093c6831bb509236839fb67931bc77f925575e418d89bf295e8265d0987b266efc89
-
SSDEEP
12288:Ms4IgvqEHGaezYf9R/sT1FmyPNweSj0UViZvc7CuvJzQdypXTjafMvjkyK0rcbtb:MND8akYlR/g+XCuBLjyMv4yWjPjb
Malware Config
Signatures
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lrsFyEuHKj.js WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lrsFyEuHKj.js WScript.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Windows\CurrentVersion\Run\SEJOKAOI5S = "\"C:\\Users\\Admin\\AppData\\Roaming\\lrsFyEuHKj.js\"" WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1708 wrote to memory of 2736 1708 wscript.exe 28 PID 1708 wrote to memory of 2736 1708 wscript.exe 28 PID 1708 wrote to memory of 2736 1708 wscript.exe 28 PID 1708 wrote to memory of 2816 1708 wscript.exe 29 PID 1708 wrote to memory of 2816 1708 wscript.exe 29 PID 1708 wrote to memory of 2816 1708 wscript.exe 29 PID 2816 wrote to memory of 2516 2816 javaw.exe 33 PID 2816 wrote to memory of 2516 2816 javaw.exe 33 PID 2816 wrote to memory of 2516 2816 javaw.exe 33
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\a3b2ac28fb71d8461b6c90327fabb5a1.js1⤵
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\lrsFyEuHKj.js"2⤵
- Drops startup file
- Adds Run key to start application
PID:2736
-
-
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\dabojtncc.txt"2⤵
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Program Files\Java\jre7\bin\java.exe"C:\Program Files\Java\jre7\bin\java.exe" -jar C:\Users\Admin\AppData\Local\Temp\_0.83160535150108557398704779228412557.class3⤵PID:2516
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5b32f33019405b01f6563c5dba961d1bd
SHA12d5bce8cd411e36a1df543ea08d5ed1bfb4dbd2b
SHA256bcfa917d54f587be8aa5bcc8d46fdedbc8b60d7ed30b3663cdbc7b3584070e20
SHA51212ce79b5ad91985c0f7ea28ee7b793c8d816a3fb690fdc070e50c56c880f7ef8475c3eecf9a219607889a550de378fd720fe6e12523cb5e1b18dea308c302ba8
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-928733405-3780110381-2966456290-1000\83aa4cc77f591dfc2374580bbd95f6ba_3d25fb85-47e3-4ffb-8cc7-d217183fd877
Filesize45B
MD5c8366ae350e7019aefc9d1e6e6a498c6
SHA15731d8a3e6568a5f2dfbbc87e3db9637df280b61
SHA25611e6aca8e682c046c83b721eeb5c72c5ef03cb5936c60df6f4993511ddc61238
SHA51233c980d5a638bfc791de291ebf4b6d263b384247ab27f261a54025108f2f85374b579a026e545f81395736dd40fa4696f2163ca17640dd47f1c42bc9971b18cd
-
Filesize
473KB
MD557845a03f0630d3fbb9caa203e940935
SHA19c4bb48d46593af760ddb9aec6160e2f379e99f7
SHA25685e1a1df9973a080afe6a11d338a36994732a40cf9f891ec7f2b69dc56aed19f
SHA5127ede78b67b49d91d13ab3eb642874263899231d1c4fbb1fa5575f8c904f46fb32091986b9bd9f2824859f6e6748f112314e745f0ac858d08f3a3b9b152ee64e1
-
Filesize
10KB
MD51ba75bca44a20a321cea4e496ce91a85
SHA15a14b44b498f56cbe7b248c537479c845ff465c6
SHA2564035eee1e50075cfcaf233c8d0511dfeeeb01870b1a4baf4a43e9b37a03cc804
SHA5122aaf2cafe8951a03e81d56eadb1d83516a9fc986d7ce6e8aa9a2704da1916feb900b42e271979cdfd0c8852ed2fa17c948a394d3e5977a47e2140fcb2d945481