Analysis
-
max time kernel
138s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 01:49 UTC
Static task
static1
Behavioral task
behavioral1
Sample
235c68f406aa41b7e1a87e35d83add4c.js
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
235c68f406aa41b7e1a87e35d83add4c.js
Resource
win10v2004-20231215-en
General
-
Target
235c68f406aa41b7e1a87e35d83add4c.js
-
Size
201KB
-
MD5
235c68f406aa41b7e1a87e35d83add4c
-
SHA1
dadb5bd81a34b437863e3d744ea0a06c48533b39
-
SHA256
9285fa6ba7f6cb35a4371d51a11f7c5c7aa582cb1deec294aff20ec5060b0a2d
-
SHA512
158661fdbd3c48fb3f3dba455833553e0c3c1c64d4007262515a689f755f5b752b34f7ead147834852445f60328e3d66b0ea44bfa79372f1667ea14297fa7d1a
-
SSDEEP
3072:ucygHBboR/hsrTjXCXJiMJexk0/ouyvTXiPbPN4kAx/cdDQaL:5HBb65CyNJexk0oGPD8KRL
Malware Config
Signatures
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ruYArSxXtj.js WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ruYArSxXtj.js WScript.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Run\SEJOKAOI5S = "\"C:\\Users\\Admin\\AppData\\Roaming\\ruYArSxXtj.js\"" WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2496 wrote to memory of 2704 2496 wscript.exe 28 PID 2496 wrote to memory of 2704 2496 wscript.exe 28 PID 2496 wrote to memory of 2704 2496 wscript.exe 28 PID 2496 wrote to memory of 2708 2496 wscript.exe 29 PID 2496 wrote to memory of 2708 2496 wscript.exe 29 PID 2496 wrote to memory of 2708 2496 wscript.exe 29
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\235c68f406aa41b7e1a87e35d83add4c.js1⤵
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\ruYArSxXtj.js"2⤵
- Drops startup file
- Adds Run key to start application
PID:2704
-
-
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\qrijzne.txt"2⤵PID:2708
-
Network
-
Remote address:8.8.8.8:53Requestjavaslinns.duia.roIN AResponse
-
Remote address:8.8.8.8:53Requestgithub.comIN AResponsegithub.comIN A140.82.121.3
-
Remote address:8.8.8.8:53Requestrepo1.maven.orgIN AResponserepo1.maven.orgIN CNAMEdualstack.sonatype.map.fastly.netdualstack.sonatype.map.fastly.netIN A199.232.192.209dualstack.sonatype.map.fastly.netIN A199.232.196.209
-
589 B 283 B 8 6
-
450 B 144 B 5 3
-
450 B 144 B 5 3
-
680 B 4.2kB 10 9
-
64 B 120 B 1 1
DNS Request
javaslinns.duia.ro
-
56 B 72 B 1 1
DNS Request
github.com
DNS Response
140.82.121.3
-
61 B 140 B 1 1
DNS Request
repo1.maven.org
DNS Response
199.232.192.209199.232.196.209
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5ae4f924072e8dd90687607e7becdde2e
SHA1225d2c7cf6506bf59d865fe3dba1b6c1736d492b
SHA256915de15ccb287c58270e6bc23523b0cde9ce077dbc0fef517faca1a1a0313286
SHA51214da1de2af981af4390e3bb95e29f968f0ef67af011202ce9f598e9f553f822e37013301c965f871ad2660cc451fb7c1ad619bf9533405e7424ad88f199803f0
-
Filesize
9KB
MD5ca4e11b0bbf70a587e0d653bfceded8c
SHA1c70eeac3273988740e937e21e11948b003295582
SHA256d0a3dc9322f9f6f9028f437d45757560de849fd0a0a6dcf8c92beed012b61e0d
SHA512291bbeb73d3ecacfe5c50aa9fd59f0542eea4950a82d0def79318017d5a0c9bcd3792a49c17309414c7678235ffeae284f29643e2be4b4a368592c0f5f64bdf0