Analysis
-
max time kernel
0s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 17:20
Static task
static1
Behavioral task
behavioral1
Sample
03240e51f616b0cb511a2dd0067a920c.js
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
03240e51f616b0cb511a2dd0067a920c.js
Resource
win10v2004-20231222-en
General
-
Target
03240e51f616b0cb511a2dd0067a920c.js
-
Size
205KB
-
MD5
03240e51f616b0cb511a2dd0067a920c
-
SHA1
c7a40396ffac70068ff23137fd91226af60220dd
-
SHA256
b57cfc1af523cd35c88bad88736b56631eaed2d0e695cd22abe2e3a4ba4b135c
-
SHA512
619c8b4f3b02e47d6c2e78c6634c441699ff205b13dbff58d044ebdb0b94f3436dcd21cddbcfe0239a16e4d7d80b7ffd3bd7bd2edc4479f1f41d4fd2ad793016
-
SSDEEP
3072:IhDGvrklJG02a9x7UOOHOwGtu+Qpdjo5+tKs10s7Ke05DgHPA9d3Z6K6/0Pmb+o:5siaT7UO9wGETdw+tKs1Z7Kp4A9DgjZ
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
pid Process 3480 icacls.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\03240e51f616b0cb511a2dd0067a920c.js1⤵PID:1004
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\PpKSWiFIyO.js"2⤵PID:2804
-
-
C:\Program Files\Java\jre-1.8\bin\javaw.exe"C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\mtkdnfgrx.txt"2⤵PID:2200
-
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M3⤵
- Modifies file permissions
PID:3480
-
-