Analysis
-
max time kernel
148s -
max time network
161s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26-02-2024 21:57
Static task
static1
Behavioral task
behavioral1
Sample
a51cc3c60ccd7b5ea425e70d4a6d3b66174f6e0b71304e9cc34bd800e54d6bc4.js
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a51cc3c60ccd7b5ea425e70d4a6d3b66174f6e0b71304e9cc34bd800e54d6bc4.js
Resource
win10v2004-20240226-en
General
-
Target
a51cc3c60ccd7b5ea425e70d4a6d3b66174f6e0b71304e9cc34bd800e54d6bc4.js
-
Size
16KB
-
MD5
836365de25b8b33c14a7971eeca6151b
-
SHA1
2d781e6634f16e12952318b84185f73637724c9c
-
SHA256
a51cc3c60ccd7b5ea425e70d4a6d3b66174f6e0b71304e9cc34bd800e54d6bc4
-
SHA512
9b30560d74689238c15c0b7c35fc2cd8d007352445be8fda6c84be1ed602303a9285212a830df5e79131ee19d2ef738be3a942bd58147249be51572e22031f85
-
SSDEEP
384:wLvHm13dN8b4H28naIpRkIfyqcmNxey3hzi8zzHLRsdqjyNLxFcXtqFZaZ:wi1tNXT7PWchmYxsdqjyNNFc0FZaZ
Malware Config
Signatures
-
Blocklisted process makes network request 16 IoCs
flow pid Process 4 2228 wscript.exe 6 2228 wscript.exe 7 2228 wscript.exe 9 2228 wscript.exe 10 2228 wscript.exe 11 2228 wscript.exe 13 2228 wscript.exe 14 2228 wscript.exe 15 2228 wscript.exe 17 2228 wscript.exe 18 2228 wscript.exe 19 2228 wscript.exe 21 2228 wscript.exe 22 2228 wscript.exe 23 2228 wscript.exe 25 2228 wscript.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a51cc3c60ccd7b5ea425e70d4a6d3b66174f6e0b71304e9cc34bd800e54d6bc4.js wscript.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\P7EKOWB6GH = "\"C:\\ProgramData\\a51cc3c60ccd7b5ea425e70d4a6d3b66174f6e0b71304e9cc34bd800e54d6bc4.js\"" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2900 schtasks.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2228 wrote to memory of 2900 2228 wscript.exe 29 PID 2228 wrote to memory of 2900 2228 wscript.exe 29 PID 2228 wrote to memory of 2900 2228 wscript.exe 29 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\a51cc3c60ccd7b5ea425e70d4a6d3b66174f6e0b71304e9cc34bd800e54d6bc4.js1⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\ProgramData\a51cc3c60ccd7b5ea425e70d4a6d3b66174f6e0b71304e9cc34bd800e54d6bc4.js2⤵
- Creates scheduled task(s)
PID:2900
-