Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19/02/2024, 10:12
Static task
static1
Behavioral task
behavioral1
Sample
PO-65547.js
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
PO-65547.js
Resource
win10v2004-20231215-en
General
-
Target
PO-65547.js
-
Size
852KB
-
MD5
5856355b838c7c8039c95d21fd8be3d9
-
SHA1
687dc393de59093151ae382c2cb05e8e1150b184
-
SHA256
3e412415534fe225cdff7d62e3f6aed4a060e83b18b2d139e3201886d6fa37f3
-
SHA512
1ffcc827b78cb6d770ead4a7d2c3dca7d5180a7d8350df8a6413a6ac49e19ca474486b64263b1b1a66542cbd72c490f45a309988e7695e1c32163aa3c99276f4
-
SSDEEP
6144:XQcSb+aGaK03qUext3Rrr3O0y4lGAnEBXU5GDHnA1X2oY8NJAhiVjYZb2L/F1j8j:gH
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2516 2172 wscript.exe 28 PID 2172 wrote to memory of 2516 2172 wscript.exe 28 PID 2172 wrote to memory of 2516 2172 wscript.exe 28
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\PO-65547.js1⤵
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\hnxlqdigoc.txt"2⤵PID:2516
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5878180ed3a5baf3352b3ea3d92a3c52b
SHA1144a9b7b6d8309b44f9631156fa1ff4381204943
SHA2561bf26c165f67d151302623a90f09cf3835d9cba760253729429728238b865aee
SHA512ac31f13f7bcc4597c3d886bb78649db621ca36152365284e87eb29e6dbd7991a14e8be9450e500dae71938c88fb375cb1d9aa9748a39b5c4a30b2f33c06bed66