Analysis
-
max time kernel
142s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03-04-2024 00:06
Static task
static1
Behavioral task
behavioral1
Sample
G47C4A2M39G.js
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
G47C4A2M39G.js
Resource
win10v2004-20240226-en
General
-
Target
G47C4A2M39G.js
-
Size
81KB
-
MD5
74229d35e52cb89fa859f397a55cf590
-
SHA1
dea9ff00836eb970524a2ea0ae20b24990b918ad
-
SHA256
875e7fd7d02db4e381cd7facd6ab1f6b5e643e12ecf76bfccdf431ef6169a448
-
SHA512
22f25fca1ff5325586be6e9c854fbc32b103f502a5d003f3c5fe0ef9739da0f6dcb931c5ecc6f51e1008c092b726d35545ff575e9ea0d21ccb88b70a55af27fc
-
SSDEEP
192:/jTKDrSsWruBc3N19erDL1ow9yQ9y9JkLE6+61Wsz+fr+5inP7TvsC+U6OEsO+oU:rTvPi/vmw4R/4K/Ktg
Malware Config
Signatures
-
Blocklisted process makes network request 6 IoCs
Processes:
wscript.exeflow pid process 4 1396 wscript.exe 8 1396 wscript.exe 9 1396 wscript.exe 11 1396 wscript.exe 12 1396 wscript.exe 13 1396 wscript.exe -
Drops startup file 2 IoCs
Processes:
wscript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\G47C4A2M39G.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\G47C4A2M39G.js wscript.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
wscript.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Windows\CurrentVersion\Run\JC4G62HNZ6 = "'C:\\Users\\Admin\\AppData\\Local\\Temp\\G47C4A2M39G.js'" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
wscript.exedescription pid process target process PID 1396 wrote to memory of 2660 1396 wscript.exe schtasks.exe PID 1396 wrote to memory of 2660 1396 wscript.exe schtasks.exe PID 1396 wrote to memory of 2660 1396 wscript.exe schtasks.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\G47C4A2M39G.js1⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr 'C:\Users\Admin\AppData\Local\Temp\G47C4A2M39G.js2⤵
- Creates scheduled task(s)
PID:2660
-