Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
26-02-2024 21:53
Static task
static1
Behavioral task
behavioral1
Sample
a4668c29be9951320ab96983772a7ca6819e9c511502243ac8543b1879d6ed09.js
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
a4668c29be9951320ab96983772a7ca6819e9c511502243ac8543b1879d6ed09.js
Resource
win10v2004-20240226-en
General
-
Target
a4668c29be9951320ab96983772a7ca6819e9c511502243ac8543b1879d6ed09.js
-
Size
82KB
-
MD5
7929c97ce63fe3cdacfc7352dc166de4
-
SHA1
01ba4443631259f15e9b699a1bb5da740ac2db5b
-
SHA256
a4668c29be9951320ab96983772a7ca6819e9c511502243ac8543b1879d6ed09
-
SHA512
8785c0a0b54965d7e1d8f7936c9d7c0be72a1947f83821620b76428917cdbf0895d1de508262eb0f97743b82c5d989da45573faeffd0be207c854f27de18733e
-
SSDEEP
1536:Ys0U6gprfN7+KvoGAoQ2CdLzbYaaPFIs8Ja1cu:YI6Art+z3LkaA1
Malware Config
Signatures
-
Blocklisted process makes network request 6 IoCs
flow pid Process 6 1660 wscript.exe 15 1660 wscript.exe 22 1660 wscript.exe 29 1660 wscript.exe 35 1660 wscript.exe 42 1660 wscript.exe -
Drops startup file 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XxWHiUfsIt.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XxWHiUfsIt.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4668c29be9951320ab96983772a7ca6819e9c511502243ac8543b1879d6ed09.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a4668c29be9951320ab96983772a7ca6819e9c511502243ac8543b1879d6ed09.js wscript.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\SEJOKAOI5S = "\"C:\\Users\\Admin\\AppData\\Roaming\\XxWHiUfsIt.js\"" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\QMKYOV5VW3 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\a4668c29be9951320ab96983772a7ca6819e9c511502243ac8543b1879d6ed09.js\"" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2712 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1660 wrote to memory of 2532 1660 wscript.exe 28 PID 1660 wrote to memory of 2532 1660 wscript.exe 28 PID 1660 wrote to memory of 2532 1660 wscript.exe 28 PID 1660 wrote to memory of 2712 1660 wscript.exe 30 PID 1660 wrote to memory of 2712 1660 wscript.exe 30 PID 1660 wrote to memory of 2712 1660 wscript.exe 30 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\a4668c29be9951320ab96983772a7ca6819e9c511502243ac8543b1879d6ed09.js1⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\XxWHiUfsIt.js"2⤵
- Drops startup file
- Adds Run key to start application
PID:2532
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Local\Temp\a4668c29be9951320ab96983772a7ca6819e9c511502243ac8543b1879d6ed09.js2⤵
- Creates scheduled task(s)
PID:2712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD5f62b59edbb6e670d81c15130a915e2b1
SHA1d4c4e5970208baaef7b5def3c6a498bdf22a0020
SHA256c0d33f59aec9f2ed5a83b75f7f54e370ce8ba97e9575bd45d3cfe32631ecab18
SHA5125ca9ead9f4c5b6404d09fe9185fd53e50e3c03ce4a62229cef851c605005aef8d83b48bf8403c26f6d7bb71fec2c7b387e341c70d8d4243b6bf6d532e3ed2baa