Analysis
-
max time kernel
148s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
26-02-2024 21:54
Static task
static1
Behavioral task
behavioral1
Sample
a48662837e2ec326182f3c966128023993f0ddb16d70ca0b457190f9239aafd6.js
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
a48662837e2ec326182f3c966128023993f0ddb16d70ca0b457190f9239aafd6.js
Resource
win10v2004-20240226-en
General
-
Target
a48662837e2ec326182f3c966128023993f0ddb16d70ca0b457190f9239aafd6.js
-
Size
20KB
-
MD5
7cca426f80eb9e873deda56270e3a87d
-
SHA1
3d453d3444f0fd8b9b36690846d53afe6e46e3ce
-
SHA256
a48662837e2ec326182f3c966128023993f0ddb16d70ca0b457190f9239aafd6
-
SHA512
240aee7b4bf29c4668c6f8676378d4e278453a5941f082c1b343c4e8353c71961974b1dd51693efbff48d2d9ab330e890c6530592354f755d9b7338b979c18ed
-
SSDEEP
384:3SK4zDaYUwp4CgPOglA+SXPLzkcauhZvQVcJeaDhDK:i/fGmgl+zzkcautwaDhu
Malware Config
Signatures
-
Blocklisted process makes network request 6 IoCs
flow pid Process 6 2912 wscript.exe 12 2912 wscript.exe 17 2912 wscript.exe 23 2912 wscript.exe 26 2912 wscript.exe 32 2912 wscript.exe -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ItfSPdhJKB.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ItfSPdhJKB.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a48662837e2ec326182f3c966128023993f0ddb16d70ca0b457190f9239aafd6.js wscript.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\SEJOKAOI5S = "\"C:\\Users\\Admin\\AppData\\Roaming\\ItfSPdhJKB.js\"" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\RV7KJCEOJC = "\"C:\\Users\\Admin\\AppData\\Roaming\\a48662837e2ec326182f3c966128023993f0ddb16d70ca0b457190f9239aafd6.js\"" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1028 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2912 wrote to memory of 2492 2912 wscript.exe 28 PID 2912 wrote to memory of 2492 2912 wscript.exe 28 PID 2912 wrote to memory of 2492 2912 wscript.exe 28 PID 2912 wrote to memory of 1028 2912 wscript.exe 30 PID 2912 wrote to memory of 1028 2912 wscript.exe 30 PID 2912 wrote to memory of 1028 2912 wscript.exe 30 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\a48662837e2ec326182f3c966128023993f0ddb16d70ca0b457190f9239aafd6.js1⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\ItfSPdhJKB.js"2⤵
- Drops startup file
- Adds Run key to start application
PID:2492
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\a48662837e2ec326182f3c966128023993f0ddb16d70ca0b457190f9239aafd6.js2⤵
- Creates scheduled task(s)
PID:1028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD50851f9bfb7bdea6addc8e4fcaa6a61aa
SHA1039314465e36535a70401b02f1440c3ae7280aeb
SHA2560ddbfca6f4f211321799ea6b750f5a4282e911716b497ac4c24ecb88f89af501
SHA512ad0eb6d2fb7f988f8c280fe873659f456d6a40180bc6fb781bc9742836db89f4783d31544d2e471b0ceaea11970af813c117b14480afa4f855de6418e1c93fe2