Analysis
-
max time kernel
198s -
max time network
250s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 09:40
Static task
static1
Behavioral task
behavioral1
Sample
14bf111a8393a7293bcedcb4836c9be0.js
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
14bf111a8393a7293bcedcb4836c9be0.js
Resource
win10v2004-20231215-en
General
-
Target
14bf111a8393a7293bcedcb4836c9be0.js
-
Size
9KB
-
MD5
14bf111a8393a7293bcedcb4836c9be0
-
SHA1
ba000e395f99d5be511c4212dc80a4609d342a4b
-
SHA256
510b335ce718d50da78a27b1750e2af1b18994b10e550c78c61a4491976eb974
-
SHA512
60180d69e6db7711fa934a4e81aa69445c14a171220567f1a028673a45ee450eea3f1639a83dbc3ce00f87cdb06e713a460631f3eda308f74c85cdf8e5f23cac
-
SSDEEP
192:QJcM9Z0N7lk8ksoAsNJIS7WBUeaZTOVwBBnCCzxtNLFH5EOKxOOQ:QZ9Z8768ksoAs/IQneaZCVspdzxrFHBb
Malware Config
Signatures
-
Blocklisted process makes network request 5 IoCs
flow pid Process 4 2844 wscript.exe 5 2844 wscript.exe 8 2844 wscript.exe 9 2844 wscript.exe 10 2844 wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\14bf111a8393a7293bcedcb4836c9be0.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\14bf111a8393a7293bcedcb4836c9be0.js wscript.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\MX1CAYIRN3 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\14bf111a8393a7293bcedcb4836c9be0.js\"" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2852 schtasks.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2844 wrote to memory of 2852 2844 wscript.exe 29 PID 2844 wrote to memory of 2852 2844 wscript.exe 29 PID 2844 wrote to memory of 2852 2844 wscript.exe 29 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\14bf111a8393a7293bcedcb4836c9be0.js1⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Local\Temp\14bf111a8393a7293bcedcb4836c9be0.js2⤵
- Creates scheduled task(s)
PID:2852
-