Analysis
-
max time kernel
142s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
28-12-2023 01:29
Static task
static1
Behavioral task
behavioral1
Sample
be1345c7e8039f7d3782a06a03361767.js
Resource
win7-20231129-en
4 signatures
150 seconds
General
-
Target
be1345c7e8039f7d3782a06a03361767.js
-
Size
148KB
-
MD5
be1345c7e8039f7d3782a06a03361767
-
SHA1
21d422062fa6de71e94b529e67566477333df43f
-
SHA256
42cadce684f1b747fa31f2c109c2a729ca5d1baf4aed93f3c3f87fb8f7053deb
-
SHA512
54a486c8e832cedbadee557fd64f54493bf4ee7c5be2fe4f08a9c1a29f6663d1b91bddbf3038e306bf5060578617b7c6dd502f66e2444d7dc79e2da812a96da8
-
SSDEEP
192:nlu4lgWAi75WbAZvw1hdh12cB5kw94tMa3dZYkVdPrv1kQuIVLk5/lWWW5RazC8F:chWA5KWy24jHuHqWWoKSqrE
Malware Config
Signatures
-
Blocklisted process makes network request 13 IoCs
flow pid Process 4 2196 wscript.exe 6 2196 wscript.exe 7 2196 wscript.exe 9 2196 wscript.exe 10 2196 wscript.exe 11 2196 wscript.exe 13 2196 wscript.exe 14 2196 wscript.exe 15 2196 wscript.exe 17 2196 wscript.exe 18 2196 wscript.exe 19 2196 wscript.exe 21 2196 wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\be1345c7e8039f7d3782a06a03361767.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\be1345c7e8039f7d3782a06a03361767.js wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).