Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-01-2024 18:31
Static task
static1
Behavioral task
behavioral1
Sample
RFQ SANOVIT.js
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
RFQ SANOVIT.js
Resource
win10v2004-20231215-en
General
-
Target
RFQ SANOVIT.js
-
Size
5.8MB
-
MD5
68fe8b2c25d14040c66447c5c79a9ada
-
SHA1
cad211509ce75af931879b13af4f97d1e550f427
-
SHA256
830229964e0a12a468c5d3c0578a5e4e782c2ae7bcc240d7bf6f82a373ae08c6
-
SHA512
8649ec2b2a41fca46cff2f6acb3a159eabbc7dcfacf858990b3f092618b706af9265299be2d650b9c39f46843bdb90539861e61a2cfef8778f7cca4a4567c84f
-
SSDEEP
24576:KDlDx+TAMOOb5biMkVXTFQRkdgMdsrot/ycPMP4qavnS8CQD+52/UBT6twHHeV1E:X
Malware Config
Signatures
-
Blocklisted process makes network request 19 IoCs
flow pid Process 7 2160 wscript.exe 8 808 wscript.exe 9 2744 wscript.exe 13 2160 wscript.exe 14 2744 wscript.exe 16 808 wscript.exe 18 2160 wscript.exe 21 808 wscript.exe 22 2744 wscript.exe 24 2160 wscript.exe 29 808 wscript.exe 30 2744 wscript.exe 32 2160 wscript.exe 35 2744 wscript.exe 37 808 wscript.exe 38 2160 wscript.exe 41 2744 wscript.exe 42 808 wscript.exe 45 2160 wscript.exe -
Drops startup file 5 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RFQ SANOVIT.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\KJYnpdFdIs.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\KJYnpdFdIs.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\KJYnpdFdIs.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RFQ SANOVIT.js wscript.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\RFQ SANOVIT = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\RFQ SANOVIT.js\"" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RFQ SANOVIT = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\RFQ SANOVIT.js\"" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\RFQ SANOVIT = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\RFQ SANOVIT.js\"" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RFQ SANOVIT = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\RFQ SANOVIT.js\"" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2088 wrote to memory of 808 2088 wscript.exe 28 PID 2088 wrote to memory of 808 2088 wscript.exe 28 PID 2088 wrote to memory of 808 2088 wscript.exe 28 PID 2088 wrote to memory of 2160 2088 wscript.exe 29 PID 2088 wrote to memory of 2160 2088 wscript.exe 29 PID 2088 wrote to memory of 2160 2088 wscript.exe 29 PID 2160 wrote to memory of 2744 2160 wscript.exe 30 PID 2160 wrote to memory of 2744 2160 wscript.exe 30 PID 2160 wrote to memory of 2744 2160 wscript.exe 30
Processes
-
C:\Windows\system32\wscript.exewscript.exe "C:\Users\Admin\AppData\Local\Temp\RFQ SANOVIT.js"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\KJYnpdFdIs.js"2⤵
- Blocklisted process makes network request
- Drops startup file
PID:808
-
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\RFQ SANOVIT.js"2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\KJYnpdFdIs.js"3⤵
- Blocklisted process makes network request
- Drops startup file
PID:2744
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
346KB
MD5f512b9328455558e518c93d453b7d6e0
SHA1bf5cf55fae037e024ac2a29497094b4c1e3a8b87
SHA25616d47f03cbf0fff0bef5ff6437179c8b480021abffa9663faa302a3d4a978392
SHA512c41ea1aee8636a4b49a9cce99f77c2ac4f5cc7b7494957beb0579f3370a6268330185ce889c028cfeb557ff3d4922d0370f788bf5104f02cfe8558f65ea1f82d
-
Filesize
5.8MB
MD568fe8b2c25d14040c66447c5c79a9ada
SHA1cad211509ce75af931879b13af4f97d1e550f427
SHA256830229964e0a12a468c5d3c0578a5e4e782c2ae7bcc240d7bf6f82a373ae08c6
SHA5128649ec2b2a41fca46cff2f6acb3a159eabbc7dcfacf858990b3f092618b706af9265299be2d650b9c39f46843bdb90539861e61a2cfef8778f7cca4a4567c84f