Analysis
-
max time kernel
142s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 04:10
Static task
static1
Behavioral task
behavioral1
Sample
279ba39874bda6eba21ce2ec81361659.js
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
279ba39874bda6eba21ce2ec81361659.js
Resource
win10v2004-20231215-en
General
-
Target
279ba39874bda6eba21ce2ec81361659.js
-
Size
201KB
-
MD5
279ba39874bda6eba21ce2ec81361659
-
SHA1
4d44cefbfce10930858e8a0f9ee8510e27152dcf
-
SHA256
2e60c3ba7e545ebb75f91c51b085be7b61d34374f178f9bca45e96624727dc9b
-
SHA512
aba2055963cab29261df5d14386235ea53535ccc6b58485d8a9758fb171deb84f7034deb38c8f209d80a15584bc2cf252edf62b956e70a09614abf00d536aa42
-
SSDEEP
3072:GIUkZFN8yRu8pXSn77+oFyLELt0GV3hfQYPGUba:fFN7Fi77rFeC+weYP+
Malware Config
Signatures
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RQJrwUperv.js WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RQJrwUperv.js WScript.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\SEJOKAOI5S = "\"C:\\Users\\Admin\\AppData\\Roaming\\RQJrwUperv.js\"" WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2640 wrote to memory of 1988 2640 wscript.exe 28 PID 2640 wrote to memory of 1988 2640 wscript.exe 28 PID 2640 wrote to memory of 1988 2640 wscript.exe 28 PID 2640 wrote to memory of 2704 2640 wscript.exe 29 PID 2640 wrote to memory of 2704 2640 wscript.exe 29 PID 2640 wrote to memory of 2704 2640 wscript.exe 29
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\279ba39874bda6eba21ce2ec81361659.js1⤵
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\RQJrwUperv.js"2⤵
- Drops startup file
- Adds Run key to start application
PID:1988
-
-
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\djlbilkozs.txt"2⤵PID:2704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD58809b0d0197b3cd57b6708280097e505
SHA19ce907eb77d894c721bac3b95ec10198b673cf90
SHA25608a35def10fe25f0e7ba5ab9f9225617752d008b77c3c8038e7f4e6e22efca97
SHA5120619a90ee431c855718ef66166886c166ee2d3461514220e46fb8cfdfc78bdade23fc6823860dedf6f1a8d65dae9e8e0c94343fe250d469ba63ecd6ef3cfe1a1
-
Filesize
92KB
MD506f61cd3d0cdf9257fcdac6483d4c1ba
SHA1f4eec20fdbc68dbdd8bb5fd1dfecd918b099ef2f
SHA256424ba40767618afade696d3714c1ba1960ff91e3bc1658fa510cd2332baf2a2f
SHA5129aa7d19fb9999d0414d2399e14ccf43b66cbd6a1bf54be6538b6a0a9e9ac096bdc065a43e4d776ed5cd01a14562446fcd535979b0756781e132e13b27b575657