Analysis
-
max time kernel
151s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
05-01-2024 07:22
Static task
static1
Behavioral task
behavioral1
Sample
4318853a176d5131f68bb12610cf3c97.js
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4318853a176d5131f68bb12610cf3c97.js
Resource
win10v2004-20231215-en
General
-
Target
4318853a176d5131f68bb12610cf3c97.js
-
Size
193KB
-
MD5
4318853a176d5131f68bb12610cf3c97
-
SHA1
79d939eefc5aede217e216934bc8b83271507aa8
-
SHA256
dd4296bc6397703d32c73bbda6dd2c497efc93af64a4e014b4803a00454225bf
-
SHA512
eac3796038e521799ad8e043fcac06e35b7f980530b5e34cd44b7e876f591223aaf21ff280b3249e01550d66d8922f589cf019a04884b2c3a69f3da1c7f3f4ca
-
SSDEEP
3072:MkHXMMrlxtiu4RuxILhHUGLiE+3F4surdgUBOBJ5rOAzmIIC+7:tMii4iLBUGLiEm1PUBOBJ5aAzqC+7
Malware Config
Signatures
-
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GySjyuTJbo.js WScript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GySjyuTJbo.js WScript.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 3200 icacls.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SEJOKAOI5S = "\"C:\\Users\\Admin\\AppData\\Roaming\\GySjyuTJbo.js\"" WScript.exe -
Drops file in Program Files directory 12 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jre-1.8\bin\server\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\dll\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\dll\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\symbols\dll\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\dll\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\symbols\dll\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\dll\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\symbols\dll\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\symbols\dll\ntdll.pdb javaw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000_Classes\Local Settings Process not Found -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3100 wrote to memory of 2436 3100 Process not Found 26 PID 3100 wrote to memory of 2436 3100 Process not Found 26 PID 3100 wrote to memory of 2788 3100 Process not Found 27 PID 3100 wrote to memory of 2788 3100 Process not Found 27 PID 2788 wrote to memory of 3200 2788 javaw.exe 66 PID 2788 wrote to memory of 3200 2788 javaw.exe 66
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\4318853a176d5131f68bb12610cf3c97.js1⤵PID:3100
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\GySjyuTJbo.js"2⤵
- Drops startup file
- Adds Run key to start application
PID:2436
-
-
C:\Program Files\Java\jre-1.8\bin\javaw.exe"C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\ytxtrzg.txt"2⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M3⤵
- Modifies file permissions
PID:3200
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD550c8302414c40a19e6b3343261630696
SHA117cc83538626d901eab90ee2be81d3f37ef4855c
SHA25613cf6e6c50c534f5223d2ef77a8ea5bbd1943ce511430b1119c33272cb89ae1a
SHA512439cd29961b70765bdd8d2da7920f503b0fa29af74dc1a111225470a608432c525ee7d008acfef337f0ada4b3d70234622236fa620a86af203125579056cbf26
-
Filesize
9KB
MD5f62440f09898b39fea134065ef66629f
SHA16481a10130d0f04b618edffe25e447f361b610bd
SHA25644c4da720bcd803731900f96e48662ea55da18b4fdcf1152192ca4322b9cb328
SHA512cfdd9fe2ab94e698d6616e1a4143a0ecbb970f01259ce555fded0673a605e1b0799ed877a77c011b9ce0cf912c3fc3d693bb9796253199321606e9136b38b33f
-
Filesize
88KB
MD5468ec549c270898563a0d61e42a3bd17
SHA16bbd046226d2a87abd4e24d9831e029d97f5e0c7
SHA256ba97fd311dcae06ced279a1a5503252c7c0986a28e4168f0f96b4afcbcb7f79b
SHA512e9071cd00f5c12810e08655f9dedd740fa3052132467a1596056d986a505d980fde4a0bac0d9ff573b630fd0c5b4aeec05b878bd3d05c549e9745fe26dbc8039