Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06-03-2024 03:48
Static task
static1
Behavioral task
behavioral1
Sample
b66fe74731233f91d26f03d3ac6c0fe3.js
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b66fe74731233f91d26f03d3ac6c0fe3.js
Resource
win10v2004-20240226-en
General
-
Target
b66fe74731233f91d26f03d3ac6c0fe3.js
-
Size
905KB
-
MD5
b66fe74731233f91d26f03d3ac6c0fe3
-
SHA1
450a3eb0ec332e643658bc6a8a5a94fb4b0f41b9
-
SHA256
877d4d148ddd634c30c781a9da721cec54f83c1cec9ff7995f94ad100c2aedd8
-
SHA512
c63c7eba2692232e4f8a84f2a6945adcf24187ff3d9ec8f7be29e51b3c2ff3c710b3d2cc6604434c2a6359801301e6fb5fb0f33b0fe1848d1c7d73bdc6f019c5
-
SSDEEP
24576:zX+2dFxSnM2MtDgnpSZHTWme0+zNh4dxQ3SK:NdOutExfPSK
Malware Config
Signatures
-
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HXpBUBTtZF.js WScript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HXpBUBTtZF.js WScript.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Windows\CurrentVersion\Run\cZCSCTaCivp = "\"C:\\Users\\Admin\\AppData\\Roaming\\Oracle\\bin\\javaw.exe\" -jar \"C:\\Users\\Admin\\lEEToECCsra\\oEKYBoRrkHp.eTbJjF\"" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Windows\CurrentVersion\Run\SEJOKAOI5S = "\"C:\\Users\\Admin\\AppData\\Roaming\\HXpBUBTtZF.js\"" WScript.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\System32\test.txt javaw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 1 IoCs
pid Process 2340 reg.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3068 java.exe 3028 javaw.exe -
Suspicious use of WriteProcessMemory 57 IoCs
description pid Process procid_target PID 1456 wrote to memory of 2680 1456 wscript.exe 28 PID 1456 wrote to memory of 2680 1456 wscript.exe 28 PID 1456 wrote to memory of 2680 1456 wscript.exe 28 PID 1456 wrote to memory of 3028 1456 wscript.exe 29 PID 1456 wrote to memory of 3028 1456 wscript.exe 29 PID 1456 wrote to memory of 3028 1456 wscript.exe 29 PID 3028 wrote to memory of 3068 3028 javaw.exe 32 PID 3028 wrote to memory of 3068 3028 javaw.exe 32 PID 3028 wrote to memory of 3068 3028 javaw.exe 32 PID 3068 wrote to memory of 2972 3068 java.exe 37 PID 3068 wrote to memory of 2972 3068 java.exe 37 PID 3068 wrote to memory of 2972 3068 java.exe 37 PID 3028 wrote to memory of 1868 3028 javaw.exe 39 PID 3028 wrote to memory of 1868 3028 javaw.exe 39 PID 3028 wrote to memory of 1868 3028 javaw.exe 39 PID 2972 wrote to memory of 1924 2972 cmd.exe 41 PID 2972 wrote to memory of 1924 2972 cmd.exe 41 PID 2972 wrote to memory of 1924 2972 cmd.exe 41 PID 1868 wrote to memory of 2184 1868 cmd.exe 42 PID 1868 wrote to memory of 2184 1868 cmd.exe 42 PID 1868 wrote to memory of 2184 1868 cmd.exe 42 PID 3028 wrote to memory of 2092 3028 javaw.exe 43 PID 3028 wrote to memory of 2092 3028 javaw.exe 43 PID 3028 wrote to memory of 2092 3028 javaw.exe 43 PID 3068 wrote to memory of 2084 3068 java.exe 44 PID 3068 wrote to memory of 2084 3068 java.exe 44 PID 3068 wrote to memory of 2084 3068 java.exe 44 PID 2084 wrote to memory of 3040 2084 cmd.exe 47 PID 2084 wrote to memory of 3040 2084 cmd.exe 47 PID 2084 wrote to memory of 3040 2084 cmd.exe 47 PID 2092 wrote to memory of 2196 2092 cmd.exe 48 PID 2092 wrote to memory of 2196 2092 cmd.exe 48 PID 2092 wrote to memory of 2196 2092 cmd.exe 48 PID 3068 wrote to memory of 1184 3068 java.exe 50 PID 3068 wrote to memory of 1184 3068 java.exe 50 PID 3068 wrote to memory of 1184 3068 java.exe 50 PID 3028 wrote to memory of 1992 3028 javaw.exe 49 PID 3028 wrote to memory of 1992 3028 javaw.exe 49 PID 3028 wrote to memory of 1992 3028 javaw.exe 49 PID 3028 wrote to memory of 2272 3028 javaw.exe 53 PID 3028 wrote to memory of 2272 3028 javaw.exe 53 PID 3028 wrote to memory of 2272 3028 javaw.exe 53 PID 3028 wrote to memory of 2340 3028 javaw.exe 55 PID 3028 wrote to memory of 2340 3028 javaw.exe 55 PID 3028 wrote to memory of 2340 3028 javaw.exe 55 PID 3028 wrote to memory of 2420 3028 javaw.exe 56 PID 3028 wrote to memory of 2420 3028 javaw.exe 56 PID 3028 wrote to memory of 2420 3028 javaw.exe 56 PID 3028 wrote to memory of 2460 3028 javaw.exe 57 PID 3028 wrote to memory of 2460 3028 javaw.exe 57 PID 3028 wrote to memory of 2460 3028 javaw.exe 57 PID 3028 wrote to memory of 2524 3028 javaw.exe 58 PID 3028 wrote to memory of 2524 3028 javaw.exe 58 PID 3028 wrote to memory of 2524 3028 javaw.exe 58 PID 2524 wrote to memory of 308 2524 javaw.exe 62 PID 2524 wrote to memory of 308 2524 javaw.exe 62 PID 2524 wrote to memory of 308 2524 javaw.exe 62 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 2460 attrib.exe 2420 attrib.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\b66fe74731233f91d26f03d3ac6c0fe3.js1⤵
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\HXpBUBTtZF.js"2⤵
- Drops startup file
- Adds Run key to start application
PID:2680
-
-
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\byuwlpcimg.txt"2⤵
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Program Files\Java\jre7\bin\java.exe"C:\Program Files\Java\jre7\bin\java.exe" -jar C:\Users\Admin\AppData\Local\Temp\_0.070472627591887225915508536563609202.class3⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\system32\cmd.execmd.exe /C cscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive6891638949599636024.vbs4⤵
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\system32\cscript.execscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive6891638949599636024.vbs5⤵PID:1924
-
-
-
C:\Windows\system32\cmd.execmd.exe /C cscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive6487640820886832411.vbs4⤵
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\system32\cscript.execscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive6487640820886832411.vbs5⤵PID:3040
-
-
-
C:\Windows\system32\xcopy.exexcopy "C:\Program Files\Java\jre7" "C:\Users\Admin\AppData\Roaming\Oracle\" /e4⤵PID:1184
-
-
-
C:\Windows\system32\cmd.execmd.exe /C cscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive7994884487959017211.vbs3⤵
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Windows\system32\cscript.execscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive7994884487959017211.vbs4⤵PID:2184
-
-
-
C:\Windows\system32\cmd.execmd.exe /C cscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive9070556217866620057.vbs3⤵
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\system32\cscript.execscript.exe C:\Users\Admin\AppData\Local\Temp\Retrive9070556217866620057.vbs4⤵PID:2196
-
-
-
C:\Windows\system32\xcopy.exexcopy "C:\Program Files\Java\jre7" "C:\Users\Admin\AppData\Roaming\Oracle\" /e3⤵PID:1992
-
-
C:\Windows\system32\cmd.execmd.exe3⤵PID:2272
-
-
C:\Windows\system32\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v cZCSCTaCivp /t REG_EXPAND_SZ /d "\"C:\Users\Admin\AppData\Roaming\Oracle\bin\javaw.exe\" -jar \"C:\Users\Admin\lEEToECCsra\oEKYBoRrkHp.eTbJjF\"" /f3⤵
- Adds Run key to start application
- Modifies registry key
PID:2340
-
-
C:\Windows\system32\attrib.exeattrib +h "C:\Users\Admin\lEEToECCsra\*.*"3⤵
- Views/modifies file attributes
PID:2420
-
-
C:\Windows\system32\attrib.exeattrib +h "C:\Users\Admin\lEEToECCsra"3⤵
- Views/modifies file attributes
PID:2460
-
-
C:\Users\Admin\AppData\Roaming\Oracle\bin\javaw.exeC:\Users\Admin\AppData\Roaming\Oracle\bin\javaw.exe -jar C:\Users\Admin\lEEToECCsra\oEKYBoRrkHp.eTbJjF3⤵
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Users\Admin\AppData\Roaming\Oracle\bin\java.exeC:\Users\Admin\AppData\Roaming\Oracle\bin\java.exe -jar C:\Users\Admin\AppData\Local\Temp\_0.39349056601031968542037462189862912.class4⤵PID:308
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
276B
MD53bdfd33017806b85949b6faa7d4b98e4
SHA1f92844fee69ef98db6e68931adfaa9a0a0f8ce66
SHA2569da575dd2d5b7c1e9bab8b51a16cde457b3371c6dcdb0537356cf1497fa868f6
SHA512ae5e5686ae71edef53e71cd842cb6799e4383b9c238a5c361b81647efa128d2fedf3bf464997771b5b0c47a058fecae7829aeedcd098c80a11008581e5781429
-
Filesize
281B
MD5a32c109297ed1ca155598cd295c26611
SHA1dc4a1fdbaad15ddd6fe22d3907c6b03727b71510
SHA25645bfe34aa3ef932f75101246eb53d032f5e7cf6d1f5b4e495334955a255f32e7
SHA51270372552dc86fe02ece9fe3b7721463f80be07a34126b2c75b41e30078cda9e90744c7d644df623f63d4fb985482e345b3351c4d3da873162152c67fc6ecc887
-
Filesize
241KB
MD5781fb531354d6f291f1ccab48da6d39f
SHA19ce4518ebcb5be6d1f0b5477fa00c26860fe9a68
SHA25697d585b6aff62fb4e43e7e6a5f816dcd7a14be11a88b109a9ba9e8cd4c456eb9
SHA5123e6630f5feb4a3eb1dac7e9125ce14b1a2a45d7415cf44cea42bc51b2a9aa37169ee4a4c36c888c8f2696e7d6e298e2ad7b2f4c22868aaa5948210eb7db220d8
-
Filesize
11KB
MD5150efb51ec05bc4a9bbb525397f5f741
SHA1be85f05d5a074fa98232cf993fc6f5a7dac9f880
SHA256b97357a2422085a44feea1491f88a44e3a9080cef0330a70b6d9cc0f0ed3cd19
SHA512e45f7012eb013e53b9a49e239bf7c07a81a08587501674fdb0e6f048edfa904b01138da374ce51b131f1bda952761cc64e317fe453e76d8cf099868a4ad301e5
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1658372521-4246568289-2509113762-1000\83aa4cc77f591dfc2374580bbd95f6ba_f4bfc772-1e14-4cb7-967a-2360098b659f
Filesize45B
MD5c8366ae350e7019aefc9d1e6e6a498c6
SHA15731d8a3e6568a5f2dfbbc87e3db9637df280b61
SHA25611e6aca8e682c046c83b721eeb5c72c5ef03cb5936c60df6f4993511ddc61238
SHA51233c980d5a638bfc791de291ebf4b6d263b384247ab27f261a54025108f2f85374b579a026e545f81395736dd40fa4696f2163ca17640dd47f1c42bc9971b18cd
-
Filesize
473KB
MD5ca4cf45e9499c04f77d54212bb0805c0
SHA1296688e7207ddbdd7f0e5096ae9c1993b5ff130b
SHA256f8255759c5da02e9b0de11ea93f90f14fc34bb8cd839ff7c4a53a86438b11344
SHA51290075be1e95bacdb020504304b79cc1e2fca3eadcffd87d00c16d95ce93922e3b1835b93d0f91874dcfb3dd17b8dafad65c3a258bd95a0e05a237cd4f1691d0b
-
Filesize
47B
MD5b0455415e8f22f6b3d7ab6795326093d
SHA16a8eedd28471a8bf2be794a4c811f1f1f3ce6bd6
SHA25615c3614e801b87c4447264d9664921b3a3f2ecf0e8fbe02f110e1219aa1ee0ad
SHA51216b33727e725099a750365e46cb2170f9aa73994e32e3a603ce6c8bf76ec68e57c1b74012b27b26106be2f0ae60130c9fe2a61b3ce46beb909a8356d5ddbddc8