Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04/02/2024, 18:35 UTC
Static task
static1
Behavioral task
behavioral1
Sample
8fdc868b35a760294af50f21f3a36337.js
Resource
win7-20231215-en
4 signatures
150 seconds
General
-
Target
8fdc868b35a760294af50f21f3a36337.js
-
Size
23KB
-
MD5
8fdc868b35a760294af50f21f3a36337
-
SHA1
644818ad3b6d733c34ac2f5e11741bb72c1498f7
-
SHA256
63426a314efd8585245ae432e2041dbde96bf69b2dc39dddeea63271bef027c2
-
SHA512
3e2cbd90575b177ab74e0990aa273db548f98b757bf0547445c51d945c52e9bf72ff96a556967b5d09a8dfae500f1d5fe1a6a4fd4a0be5ae180576f989cf772c
-
SSDEEP
384:cyjzaYOv92K1j57EQ7sq7Iu7FC9if5zO0cY0SfYNY29YwjhdpG1kpOiI10cWoFUs:cEzCv99plJGihqPSfmF9vjhdpG1kpOic
Malware Config
Signatures
-
Blocklisted process makes network request 6 IoCs
flow pid Process 5 1720 wscript.exe 8 1720 wscript.exe 9 1720 wscript.exe 11 1720 wscript.exe 12 1720 wscript.exe 13 1720 wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8fdc868b35a760294af50f21f3a36337.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8fdc868b35a760294af50f21f3a36337.js wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
Processes
Network
-
Remote address:8.8.8.8:53Requestharold.ns01.infoIN AResponseharold.ns01.infoIN A91.92.249.69
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
104 B 2