Analysis
-
max time kernel
168s -
max time network
185s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
28-12-2023 01:29
Static task
static1
Behavioral task
behavioral1
Sample
be1345c7e8039f7d3782a06a03361767.js
Resource
win7-20231129-en
4 signatures
150 seconds
General
-
Target
be1345c7e8039f7d3782a06a03361767.js
-
Size
148KB
-
MD5
be1345c7e8039f7d3782a06a03361767
-
SHA1
21d422062fa6de71e94b529e67566477333df43f
-
SHA256
42cadce684f1b747fa31f2c109c2a729ca5d1baf4aed93f3c3f87fb8f7053deb
-
SHA512
54a486c8e832cedbadee557fd64f54493bf4ee7c5be2fe4f08a9c1a29f6663d1b91bddbf3038e306bf5060578617b7c6dd502f66e2444d7dc79e2da812a96da8
-
SSDEEP
192:nlu4lgWAi75WbAZvw1hdh12cB5kw94tMa3dZYkVdPrv1kQuIVLk5/lWWW5RazC8F:chWA5KWy24jHuHqWWoKSqrE
Malware Config
Signatures
-
Blocklisted process makes network request 10 IoCs
flow pid Process 20 3112 wscript.exe 52 3112 wscript.exe 67 3112 wscript.exe 83 3112 wscript.exe 88 3112 wscript.exe 93 3112 wscript.exe 100 3112 wscript.exe 104 3112 wscript.exe 110 3112 wscript.exe 114 3112 wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\be1345c7e8039f7d3782a06a03361767.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\be1345c7e8039f7d3782a06a03361767.js wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).