Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04-02-2024 15:03
Static task
static1
Behavioral task
behavioral1
Sample
4035_4414671332562.js
Resource
win7-20231215-en
General
-
Target
4035_4414671332562.js
-
Size
1.7MB
-
MD5
5691f001d9a83639c5f6fed3e999e090
-
SHA1
2ba3ef2e2cca6dfdf154b0565901b4da5833cab9
-
SHA256
7780f61445e2a2ca907d5f1292a02da7753c8959902ea54b1e4bc5bdb655d95e
-
SHA512
9a3188340367feab9734c183a7c43cc98a7de149ecfe3bff27e73de717d9826aa5eab1ab4f532ebcbb43a362f274866bf342c3896fa52d56659daca5daa9eb65
-
SSDEEP
24576:NdjoqRpEnFJoYgKyWGjg5Y0SNS/tSgVNkBI2KCcaxazM9jlVQ8l4PbmFCMX1/QQS:I7RGq
Malware Config
Signatures
-
Loads dropped DLL 4 IoCs
Processes:
rundll32.exepid process 2072 rundll32.exe 2072 rundll32.exe 2072 rundll32.exe 2072 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
wscript.execmd.exedescription pid process target process PID 1960 wrote to memory of 1980 1960 wscript.exe cmd.exe PID 1960 wrote to memory of 1980 1960 wscript.exe cmd.exe PID 1960 wrote to memory of 1980 1960 wscript.exe cmd.exe PID 1980 wrote to memory of 2584 1980 cmd.exe findstr.exe PID 1980 wrote to memory of 2584 1980 cmd.exe findstr.exe PID 1980 wrote to memory of 2584 1980 cmd.exe findstr.exe PID 1980 wrote to memory of 2916 1980 cmd.exe certutil.exe PID 1980 wrote to memory of 2916 1980 cmd.exe certutil.exe PID 1980 wrote to memory of 2916 1980 cmd.exe certutil.exe PID 1980 wrote to memory of 2072 1980 cmd.exe rundll32.exe PID 1980 wrote to memory of 2072 1980 cmd.exe rundll32.exe PID 1980 wrote to memory of 2072 1980 cmd.exe rundll32.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\4035_4414671332562.js1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k copy "C:\Users\Admin\AppData\Local\Temp\4035_4414671332562.js" "C:\Users\Admin\\womanlypoor.bat" && "C:\Users\Admin\\womanlypoor.bat"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\findstr.exefindstr /V mellowfemale ""C:\Users\Admin\\womanlypoor.bat""3⤵
-
C:\Windows\system32\certutil.execertutil -f -decode comfortablesteer scorchapparatus.dll3⤵
-
C:\Windows\system32\rundll32.exerundll32 scorchapparatus.dll,main3⤵
- Loads dropped DLL
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\comfortablesteerFilesize
111KB
MD585c5984b1c3e85af87341c9849e6e414
SHA1f290180076dcaba1dbfa649e359f479ca68bc2db
SHA256886c894b9f537531ac52bab36464ae8f5bb3358a89984a3f02fddc6b7445b306
SHA512f11e3405b58a935d30a0395c758ade37c641419bc5b443daedba769f31e3e688c0235a41309d1e0e321d7d79c0176493e47f9d9991eb947e0a4d84fef069d165
-
C:\Users\Admin\scorchapparatus.dllFilesize
142KB
MD566ab7d46797406c3e66099d060e7ba6f
SHA1329a7eecefbd5f5f138a7ca51593fcb81467d928
SHA256fa67fcbf0cc99749ce84cc5730f81304c2f8042b6e1ae13fb47fe0b535310a00
SHA51281488283aadb5ad93569ae78da3094ded001087df76b22fa744d5c10acff465d83e5222128546fa46fe6c2616ee60a8f345d7bd7c5c939a165b3f798b9df4d3e
-
C:\Users\Admin\womanlypoor.batFilesize
1.2MB
MD586feb3958edd3359028fb58fb342b956
SHA17cdc2415951d668cc81a2145ccd16e8ca9bb625f
SHA256cc361c51487d162c04329d6d4bcffc0d3b2e0f2d5bb17ff41c7ac59dfd81cf17
SHA51294d801679279f385193b880c7f7466c1653ee073a9e164fe727e9b88d07408161c4a097c891d123932fdcec2dbc2205a8787384face85e585fda483498d210aa
-
C:\Users\Admin\womanlypoor.batFilesize
1.7MB
MD55691f001d9a83639c5f6fed3e999e090
SHA12ba3ef2e2cca6dfdf154b0565901b4da5833cab9
SHA2567780f61445e2a2ca907d5f1292a02da7753c8959902ea54b1e4bc5bdb655d95e
SHA5129a3188340367feab9734c183a7c43cc98a7de149ecfe3bff27e73de717d9826aa5eab1ab4f532ebcbb43a362f274866bf342c3896fa52d56659daca5daa9eb65
-
\Users\Admin\scorchapparatus.dllFilesize
122KB
MD5c8fd979ac8a4fa4d9c48896b5cdb8c98
SHA17a0112c6e52ab0ce87e056a7039eaafb6729de5b
SHA2561a5e43ce2aa335d0819a04fe9fc3f0e030bcb6266826785cecdff0b1fc47b238
SHA5125ff9a29ea3586473283008918d1f17040e6b7f12872bb8012e795518f15d6c8d49c7dff43074ab633598d4e917773ae2fd8ea371ef2b009cf2b2874bc40af44c
-
\Users\Admin\scorchapparatus.dllFilesize
75KB
MD5d9efaa2e2292c8255074099bc4db605a
SHA1584464ab51dd13b5942e405d94f95edc0cc224ec
SHA2561e36b0d2a4cf63f7729700d16cec4478fef537a0ebdb4b30e6634db8ae651385
SHA512c380b9ef68154b28b8e806e8a84b55414057621a5fcaf13f4d5a957eb7f235afb17b565e70640bf8d5c67f6a69d411aa32a76c97a551ae88c69d8ea682635ca1
-
\Users\Admin\scorchapparatus.dllFilesize
119KB
MD5c5c1b3015e1feb0176b3123d0ab80e02
SHA1e57b5efbf81602105a582f82bf250cc8ebdbba58
SHA256f325fa4313c0db43df400fba1a99c129dd3d46ce3ac94cffba04f1703096e7fe
SHA512a76d1a9254a77428f87b59a5ce5f71a39ddd8b61a7e54ff65211cd5fd6510c33433f085bba35a0d154005fb8dafb63ef513a56674540c7b1bc063915aa1e0ebb
-
\Users\Admin\scorchapparatus.dllFilesize
94KB
MD532fe5e6e9827b4e8286f876360a41959
SHA11b23dcc78e51b7c87d634a4ceee61d92180ac769
SHA256ef54d38aa8a68214d5d9f2ea9a20e3d877f9be8d94bfb36f01dc9c38bcc3a708
SHA51265a6babc7f57bf139d61c4834abc8d6d23a4969b1086a86a8e250d783304838225a32301b4166bc1dcd23086a66d514e1ee316ce25d504f85c03d2a7713d50de
-
memory/2072-1779-0x000007FEF68D0000-0x000007FEF6A1A000-memory.dmpFilesize
1.3MB
-
memory/2072-1780-0x0000000000680000-0x00000000006A3000-memory.dmpFilesize
140KB