Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
28-01-2024 23:59
Static task
static1
Behavioral task
behavioral1
Sample
7e58440b8eb773b24aace538de1c5437.js
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7e58440b8eb773b24aace538de1c5437.js
Resource
win10v2004-20231215-en
General
-
Target
7e58440b8eb773b24aace538de1c5437.js
-
Size
67KB
-
MD5
7e58440b8eb773b24aace538de1c5437
-
SHA1
b824cf54e9e9e1c28ff2ec6b6e3de9048750f5cb
-
SHA256
21e0026aeb23c03125337151d862a29372ac17af5663fca1f5ff7beeacf82fc1
-
SHA512
a3d50e13255253989be68a25304ad51098fdbbe8873269d6fd148cc7ef641639bea881cfb57837182ee0c5036340cdd572706d0ac5552c6be8404404f79db298
-
SSDEEP
1536:YQ/nup5Ih191nup5Ih19efc//nup5Ih191nup5Ih19efcq6:7Gf9fbfWGf9fbfE
Malware Config
Signatures
-
Blocklisted process makes network request 32 IoCs
flow pid Process 5 1416 wscript.exe 7 1416 wscript.exe 9 1416 wscript.exe 10 1416 wscript.exe 13 1416 wscript.exe 14 1416 wscript.exe 18 1416 wscript.exe 19 1416 wscript.exe 22 1416 wscript.exe 23 1416 wscript.exe 25 1416 wscript.exe 26 1416 wscript.exe 31 1416 wscript.exe 32 1416 wscript.exe 34 1416 wscript.exe 35 1416 wscript.exe 37 1416 wscript.exe 38 1416 wscript.exe 43 1416 wscript.exe 44 1416 wscript.exe 46 1416 wscript.exe 47 1416 wscript.exe 50 1416 wscript.exe 52 1416 wscript.exe 55 1416 wscript.exe 56 1416 wscript.exe 59 1416 wscript.exe 60 1416 wscript.exe 62 1416 wscript.exe 64 1416 wscript.exe 68 1416 wscript.exe 69 1416 wscript.exe -
Drops startup file 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7e58440b8eb773b24aace538de1c5437.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7e58440b8eb773b24aace538de1c5437.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\rVRpsUBiCR.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\rVRpsUBiCR.js wscript.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\0HKX5ALWLG = "\"C:\\Users\\Admin\\AppData\\Roaming\\rVRpsUBiCR.js\"" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1416 wrote to memory of 2172 1416 wscript.exe 28 PID 1416 wrote to memory of 2172 1416 wscript.exe 28 PID 1416 wrote to memory of 2172 1416 wscript.exe 28
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\7e58440b8eb773b24aace538de1c5437.js1⤵
- Blocklisted process makes network request
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\rVRpsUBiCR.js"2⤵
- Drops startup file
- Adds Run key to start application
PID:2172
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD5ed533885cb7d43829db0e85dbaabec22
SHA1c19225ec3612ce86d4f5b8046ae65b3332d40776
SHA2566641f0211253402fa4b39005e29c7e0b688d3722d05746040f6c35b4c14182eb
SHA512b6420e3c79ebb31b687f1b3f89ee4a67ea45bc08628aa91cf9ad63cd6c488f198ef6f981ad784cfa6ce3534d937a4a957e02e00d2b09c99301cfba1e90d1996b