Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
07-05-2024 17:20
Static task
static1
Behavioral task
behavioral1
Sample
Pending - AWB 8020072326.js
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
Pending - AWB 8020072326.js
Resource
win10v2004-20240426-en
General
-
Target
Pending - AWB 8020072326.js
-
Size
25KB
-
MD5
1826cdc5e33da035d66fb04375289ccd
-
SHA1
42cd583dd99548c2a1408b3fc3056ac9247f914d
-
SHA256
ccdd1042d5bb499047575474d90ea911629261381b5992e91cc57e9d07eb0b1e
-
SHA512
a7c72283ca79a1e7f0dddcf72906be40309fb4800c9ba911ef8f7e4921cc0ff25a903a7c5e97337ac27297632284cecc0422d993b191356485e9fec78251d2b6
-
SSDEEP
384:pwL0wdDK1BaBjzWWxcJqoMXvW2aE2uLULwHHYBmRipLw5I5PvHTHXJ1JHSvVDD4k:inKzgePLwn78AI5PjJsVDD4f7dOpO+
Malware Config
Signatures
-
Drops startup file 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CDtcGSGmCx.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CDtcGSGmCx.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Pending - AWB 8020072326.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Pending - AWB 8020072326.js wscript.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\VD5F31VTCZ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Pending - AWB 8020072326.js\"" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\0IDR124VF6 = "\"C:\\Users\\Admin\\AppData\\Roaming\\CDtcGSGmCx.js\"" wscript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2440 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2328 wrote to memory of 2508 2328 wscript.exe 28 PID 2328 wrote to memory of 2508 2328 wscript.exe 28 PID 2328 wrote to memory of 2508 2328 wscript.exe 28 PID 2328 wrote to memory of 2440 2328 wscript.exe 30 PID 2328 wrote to memory of 2440 2328 wscript.exe 30 PID 2328 wrote to memory of 2440 2328 wscript.exe 30 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\wscript.exewscript.exe "C:\Users\Admin\AppData\Local\Temp\Pending - AWB 8020072326.js"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\CDtcGSGmCx.js"2⤵
- Drops startup file
- Adds Run key to start application
PID:2508
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Local\Temp\Pending - AWB 8020072326.js2⤵
- Creates scheduled task(s)
PID:2440
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD587d873a4fd3d66d97e9f2000cb6c3234
SHA119208c058fdde8950a9a73cb7b35cd0fd801c1a7
SHA256d7d8a8e9732d5e1bda8cd07d08d59dc33eff36f0e191d434617793fd81afe5df
SHA5129c26f307c90c8be071bd49c3cc126f9cc23582f25ed015e255c64d5a6eb48888baf7fd95ced915ffbc746faa6a38f0def95dfddc9b05b2f02dd5cc1a2cc77fc8