Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15-04-2024 12:49
Static task
static1
Behavioral task
behavioral1
Sample
15042024_2049_863858.js
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
15042024_2049_863858.js
Resource
win10v2004-20240412-en
General
-
Target
15042024_2049_863858.js
-
Size
5.7MB
-
MD5
0dd1a6b7d7b3123fcf69757ca7d73eb9
-
SHA1
4331e4a5faa2f30ae0629283c81f808482a70384
-
SHA256
1608c6837a178ccb9af63150bd8eb5aa0f7e8ea59bd54929a7cf84d2edce7c6c
-
SHA512
ecad0cd56831788ca086ceed5c05fc5b5af510543799c62b26d09c322438b0a85104964395ca083ae9fd3fa0485d106e18a64232a8ad91dba03b2ecabe6d8645
-
SSDEEP
49152:4ZKCGqnaUy405pzJvdIp7z5nPfgxNExVziKEMSTwryEeCwWZb:c
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Windows\CurrentVersion\Run\TecnoCloud = "C:\\Users\\Admin\\AppData\\Local\\TecnoCloud\\client32.exe" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1640 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 13 IoCs
pid Process 2060 wscript.exe 2060 wscript.exe 2060 wscript.exe 2060 wscript.exe 2060 wscript.exe 2060 wscript.exe 2060 wscript.exe 2060 wscript.exe 2060 wscript.exe 2060 wscript.exe 2060 wscript.exe 2060 wscript.exe 2060 wscript.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1640 AcroRd32.exe 1640 AcroRd32.exe 1640 AcroRd32.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2060 wrote to memory of 1640 2060 wscript.exe 28 PID 2060 wrote to memory of 1640 2060 wscript.exe 28 PID 2060 wrote to memory of 1640 2060 wscript.exe 28 PID 2060 wrote to memory of 1640 2060 wscript.exe 28 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\15042024_2049_863858.js1⤵
- Adds Run key to start application
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\Downloads\Notification_314.pdf"2⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1640
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
636KB
MD53a087a0f8b569f831ab85b6a5dfe6b72
SHA1412ed180798ef7499edbbfb3beb86d69a26ca7fa
SHA256cc39d33ccb25cce23fa65f6ce0c688965104bb986ed9794659b0af4a27dc86cf
SHA5122513998178f7feecbdd17242bb90ea0d81e6d6ebfe29cae7bb0bdde44c25d566f6b5009669c7e360593a7e0d8122da4260b26c5e6d11aa7ddf382d797f92a7b7
-
Filesize
1.5MB
MD547ca46c8c5a09bcdfe8c1cf23488ef83
SHA1cf3a00b348f042574696cdb4a3384e6c2970c841
SHA256767cb666de4f6276c093a9cbf4239c0a5cb228dc05c8b8df4cbfa871bb5c128a
SHA51223ff4bd5322b0330b4432443b8478dc184764c1a4a91df18d3de2650b85c150d62473e74442189f242ddd1e54303f1d54fcb89face604b9ec278505b9adaaaf2
-
Filesize
3KB
MD560ca68d026b279b0029df77358dfa6d9
SHA1ce15860d3c9897b8944ba6f088b5c19795e12e8d
SHA2567e807d23f5f1b67ee99d2f957cf82ca20a3c93229c4755b3aaaa3518609cf12e
SHA51266eaf9815c79389edcb7658085234608672958734f0ceaf4629f45b332593596720eb2a935c949891710bc528d32162efc7f2faf4231af70c619e6bde3541075
-
Filesize
21KB
MD5224640dc1a7558695ee1035b9d392f70
SHA17a88e21f8207baaa646063c104e7eb01fd4c5a90
SHA25643fd54f5457b9ece2519117083516e184a99910459428e5f90bea42e753195c0
SHA51233767616a526a94cbba9169924f64628febeee89a4413481b84235435b5d2e1bc8d5778b0865a3d36364907c0557e1fe219e64555982305d9e7a76dc91bd0bc5