Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    08-05-2024 10:31

General

  • Target

    Invoice & Packing List.js

  • Size

    352KB

  • MD5

    e38d8e75f11cf191e173aa3e2528b57a

  • SHA1

    0e7e3b6ca4118660adb1ad6cfa238613458c5245

  • SHA256

    dc6aeb1f8d342bc7863a71083222cfa544b340c181e2be87dd39f5d25aac12e4

  • SHA512

    a8d2e021f69c22918972b505b742c06ed0aed4003adef538853b68d55647a17e089828b8bc85c2e57feb7f92962dd5aa671f9a58635dbc49b7baf753ca96c176

  • SSDEEP

    6144:J0pVKGI89xY7aXi0rp+/UHXoh4aKfo3DuWmeZRgUCJeyIFhzKcvz30DBaDvzMvh:CVKa9xxs4/YzrZvz3hjzs

Score
3/10

Malware Config

Signatures

  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe "C:\Users\Admin\AppData\Local\Temp\Invoice & Packing List.js"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2924
    • C:\Program Files\Java\jre7\bin\javaw.exe
      "C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\wbvbqe.txt"
      2⤵
        PID:2956

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\wbvbqe.txt

      Filesize

      164KB

      MD5

      295d34a469ee2519f8016d7a8c794a2c

      SHA1

      eaa4737386928dffc355967c213dd19bbf2208d0

      SHA256

      c97d01edc6e28bb1a808951f917290831bd806f5155affe62fb042bbea235bf1

      SHA512

      677d63b1a19b41be1122f3d4c7839377678229907a8e9998d1057ba99e8677c4f5585c679ef40586ba26647b771fbc3db854c1c0b588c51d25bbb9134301c875

    • memory/2956-4-0x00000000024F0000-0x0000000002760000-memory.dmp

      Filesize

      2.4MB

    • memory/2956-12-0x0000000000140000-0x0000000000141000-memory.dmp

      Filesize

      4KB

    • memory/2956-19-0x0000000000140000-0x0000000000141000-memory.dmp

      Filesize

      4KB

    • memory/2956-25-0x0000000000140000-0x0000000000141000-memory.dmp

      Filesize

      4KB

    • memory/2956-44-0x0000000000140000-0x0000000000141000-memory.dmp

      Filesize

      4KB

    • memory/2956-42-0x0000000000140000-0x0000000000141000-memory.dmp

      Filesize

      4KB

    • memory/2956-149-0x00000000024F0000-0x0000000002760000-memory.dmp

      Filesize

      2.4MB