Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 17:20
Static task
static1
Behavioral task
behavioral1
Sample
03240e51f616b0cb511a2dd0067a920c.js
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
03240e51f616b0cb511a2dd0067a920c.js
Resource
win10v2004-20231222-en
General
-
Target
03240e51f616b0cb511a2dd0067a920c.js
-
Size
205KB
-
MD5
03240e51f616b0cb511a2dd0067a920c
-
SHA1
c7a40396ffac70068ff23137fd91226af60220dd
-
SHA256
b57cfc1af523cd35c88bad88736b56631eaed2d0e695cd22abe2e3a4ba4b135c
-
SHA512
619c8b4f3b02e47d6c2e78c6634c441699ff205b13dbff58d044ebdb0b94f3436dcd21cddbcfe0239a16e4d7d80b7ffd3bd7bd2edc4479f1f41d4fd2ad793016
-
SSDEEP
3072:IhDGvrklJG02a9x7UOOHOwGtu+Qpdjo5+tKs10s7Ke05DgHPA9d3Z6K6/0Pmb+o:5siaT7UO9wGETdw+tKs1Z7Kp4A9DgjZ
Malware Config
Signatures
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PpKSWiFIyO.js WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PpKSWiFIyO.js WScript.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\SEJOKAOI5S = "\"C:\\Users\\Admin\\AppData\\Roaming\\PpKSWiFIyO.js\"" WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1924 wrote to memory of 2160 1924 wscript.exe 20 PID 1924 wrote to memory of 2160 1924 wscript.exe 20 PID 1924 wrote to memory of 2160 1924 wscript.exe 20 PID 1924 wrote to memory of 2300 1924 wscript.exe 19 PID 1924 wrote to memory of 2300 1924 wscript.exe 19 PID 1924 wrote to memory of 2300 1924 wscript.exe 19
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\03240e51f616b0cb511a2dd0067a920c.js1⤵
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\bdcpgwg.txt"2⤵PID:2300
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\PpKSWiFIyO.js"2⤵
- Drops startup file
- Adds Run key to start application
PID:2160
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD52d036490e7cd2a8d9f77931d75abcbcb
SHA1912200764a8bdca02477d1ddd83d2158b0bd0667
SHA256b25f69d7c5793496272d3952497a8e20742caa18258a43bba72a75dc91a1b65e
SHA5123a699152f4196a32f21dde564517b322a9ed671b6f201fd21eac41e80e3d457349da62349141032a17c08a7187308660bb12ca1666d72f51684955bccaae657a
-
Filesize
92KB
MD52e458a59025b390fbdf7d3717314b507
SHA1d5a84f501bfa81682ebde5e31a68794140141785
SHA2566b723bd260b53c68c716ef218c78718d3e99ab4d4238a4bd823fd0cd6ec8007b
SHA5122b463bc4ef98264560abad47053549c463fc9ee098c97cd60d58c959ba67f4ddf2ca60856f6564802a9f056740fbedbb6bdc829388c136c13b334563465d1f22