Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26-01-2024 21:23
Static task
static1
Behavioral task
behavioral1
Sample
786cd57e65ffb85f2e19b3d2ef3dc0bf.js
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
786cd57e65ffb85f2e19b3d2ef3dc0bf.js
Resource
win10v2004-20231215-en
General
-
Target
786cd57e65ffb85f2e19b3d2ef3dc0bf.js
-
Size
31KB
-
MD5
786cd57e65ffb85f2e19b3d2ef3dc0bf
-
SHA1
e36e41a8bb11ec29f90e0b3c643e2707d2a2f255
-
SHA256
68921406e9b3c27e573cbf28f5d12a5b46cb40501384feaf13e4e3f753246d2c
-
SHA512
45d85f01d0b2b2f8bb13e886ec8015c0f8d906b9041910ad94c2be2de4557c312f36cf018ccf37bb6fa362b1a6a49da674a08687691e78e78855206cb6cdcb99
-
SSDEEP
768:4NMji4v+cUwNgwskCb+dLzN2V8NGw3WSk/cY03l83:UMDbU65FkqNGAZkUU
Malware Config
Signatures
-
Blocklisted process makes network request 7 IoCs
flow pid Process 5 2188 wscript.exe 10 2188 wscript.exe 18 2188 wscript.exe 23 2188 wscript.exe 29 2188 wscript.exe 34 2188 wscript.exe 42 2188 wscript.exe -
Drops startup file 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\786cd57e65ffb85f2e19b3d2ef3dc0bf.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\786cd57e65ffb85f2e19b3d2ef3dc0bf.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PzbgTgURNP.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PzbgTgURNP.js wscript.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\0L2MC7JOKR = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\786cd57e65ffb85f2e19b3d2ef3dc0bf.js\"" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\SEJOKAOI5S = "\"C:\\Users\\Admin\\AppData\\Roaming\\PzbgTgURNP.js\"" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2188 wrote to memory of 2688 2188 wscript.exe 28 PID 2188 wrote to memory of 2688 2188 wscript.exe 28 PID 2188 wrote to memory of 2688 2188 wscript.exe 28
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\786cd57e65ffb85f2e19b3d2ef3dc0bf.js1⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\PzbgTgURNP.js"2⤵
- Drops startup file
- Adds Run key to start application
PID:2688
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD591cbc6abb6d16bba34b15ca2ce44e689
SHA1f63cb5c1395b405a4e1043ce0b46488da52ea47e
SHA256ebaa4b01e859ee2f2f37178a78d9d6e668c5cb47edca97bff923fdbf68d02a74
SHA51258977af7c86a43257aa2bc17ea1eaafa49f41cee579c0504004648d0a09e2e7939d6b84c370a2d78cedd47b093009da79d6ac33e0c0cec0712f60a8a245cf0ba