Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
18-02-2024 04:42
Static task
static1
Behavioral task
behavioral1
Sample
9b647c40e98c2de028ce703d6b5558b6a9a9d75a59c7cdd81d78e71aea0c25d7.js
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
9b647c40e98c2de028ce703d6b5558b6a9a9d75a59c7cdd81d78e71aea0c25d7.js
Resource
win10v2004-20231215-en
General
-
Target
9b647c40e98c2de028ce703d6b5558b6a9a9d75a59c7cdd81d78e71aea0c25d7.js
-
Size
6KB
-
MD5
edd277e7a04ec062c49bafdb7d8b07af
-
SHA1
1ff9c18bacf61a830f4f7001c5e19f8868ceb6b8
-
SHA256
9b647c40e98c2de028ce703d6b5558b6a9a9d75a59c7cdd81d78e71aea0c25d7
-
SHA512
fe118202237beae08ed786fa6905c418e18c9b27a40083911ebe77bd23c7584124eb5ff4422a0b9f9d49f7dbc7a618b2a30cefc938cdbcb36cc30d6b711778af
-
SSDEEP
96:FnYZH1uypXd3HofJBslCFGJc9lBdqlr+bXcCnTBw5BdeCldb+rNeUo0:BYZVhDrLlriXcCnTBw5BdnldCrNHo0
Malware Config
Signatures
-
Blocklisted process makes network request 16 IoCs
flow pid Process 6 4964 wscript.exe 20 4964 wscript.exe 26 4964 wscript.exe 31 4964 wscript.exe 43 4964 wscript.exe 44 4964 wscript.exe 45 4964 wscript.exe 49 4964 wscript.exe 50 4964 wscript.exe 54 4964 wscript.exe 58 4964 wscript.exe 59 4964 wscript.exe 60 4964 wscript.exe 61 4964 wscript.exe 62 4964 wscript.exe 67 4964 wscript.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\9b647c40e98c2de028ce703d6b5558b6a9a9d75a59c7cdd81d78e71aea0c25d7.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\9b647c40e98c2de028ce703d6b5558b6a9a9d75a59c7cdd81d78e71aea0c25d7.js wscript.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\F5D13XFZ84 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\9b647c40e98c2de028ce703d6b5558b6a9a9d75a59c7cdd81d78e71aea0c25d7.js\"" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).