Analysis
-
max time kernel
163s -
max time network
167s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 02:34
Static task
static1
Behavioral task
behavioral1
Sample
24a49c42db23182b354a5672871d7656.js
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
24a49c42db23182b354a5672871d7656.js
Resource
win10v2004-20231215-en
General
-
Target
24a49c42db23182b354a5672871d7656.js
-
Size
16KB
-
MD5
24a49c42db23182b354a5672871d7656
-
SHA1
645a4265ec79be23b68720df010b825d405a1a64
-
SHA256
789e896d4629b24edcc81ea72ae6d7dca8469387665f376bfa342b4e9f06bf52
-
SHA512
38d82603b3e3fdf5e0d43a92e9155fd3e331d3a798cb14ec58ccd9379118ce53bdb1b6f1a65e8b6d7e0c41285a0d1476bcffcbac0abea384dba1ef894912466d
-
SSDEEP
384:b3eeQYggN0jQXGNNS/7puQORhTYrlvmIxaN+gszMpodvQ9NlB26:DVsTQXGufO/6vU/szM1vX26
Malware Config
Signatures
-
Blocklisted process makes network request 10 IoCs
flow pid Process 5 2248 wscript.exe 8 2248 wscript.exe 13 2248 wscript.exe 18 2248 wscript.exe 22 2248 wscript.exe 26 2248 wscript.exe 30 2248 wscript.exe 35 2248 wscript.exe 39 2248 wscript.exe 40 2248 wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fvmVTYxeqb.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fvmVTYxeqb.js wscript.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Run\B02N3ZE1UL = "\"C:\\Users\\Admin\\AppData\\Roaming\\fvmVTYxeqb.js\"" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2248 wrote to memory of 2832 2248 wscript.exe 27 PID 2248 wrote to memory of 2832 2248 wscript.exe 27 PID 2248 wrote to memory of 2832 2248 wscript.exe 27
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\24a49c42db23182b354a5672871d7656.js1⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\fvmVTYxeqb.js"2⤵
- Drops startup file
- Adds Run key to start application
PID:2832
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD52ba1970b35cbf6896dbdedb3e61eab35
SHA13a9a1d222950c40f16c89507c69287568344db68
SHA25636c4200b468fad9de5070cb4d457078ae7359d3a345c7dd07da6f2ef6a328837
SHA512e347ee9caccf4e83828c681918ae967f7f92a669a7e023a5017fe46af813164ba7701e4e605fb5db59e4577545d9a3896ae3c0bf8cc1807abcfcec8cd885ec0f