Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    08/05/2024, 12:55

General

  • Target

    193463d447dec8fe81001a909aeefbe810d916276f6c62d2ae2cdc2cd8d86eaa.js

  • Size

    7.7MB

  • MD5

    0eb066f65aa3d18672949aa983266f22

  • SHA1

    e96454cc5aa7adc2f88845ad82b593676c2a41db

  • SHA256

    193463d447dec8fe81001a909aeefbe810d916276f6c62d2ae2cdc2cd8d86eaa

  • SHA512

    b6c602c7b04ea64b6669a6944b38991b1df1647f216bfdb1083308a73d7d3aef3b4361137954dc795eb47e7db215faf8d891c4965a65d64ead215e033b3ead6b

  • SSDEEP

    49152:s9ytwpCQK+fm9ytwpCQK+fm9ytwpCQK+fm9ytwpCQK+fm9ytwpCQK+fm9ytwpCQY:m

Score
3/10

Malware Config

Signatures

  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\193463d447dec8fe81001a909aeefbe810d916276f6c62d2ae2cdc2cd8d86eaa.js
    1⤵
      PID:2128
    • C:\Windows\system32\taskeng.exe
      taskeng.exe {964F5C60-9C9F-4CD4-BB5B-0337396C44B7} S-1-5-21-2297530677-1229052932-2803917579-1000:HKULBIBU\Admin:Interactive:[1]
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:2608
      • C:\Windows\system32\wscript.EXE
        C:\Windows\system32\wscript.EXE MULTID~1.JS
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2780
        • C:\Windows\System32\cscript.exe
          "C:\Windows\System32\cscript.exe" "MULTID~1.JS"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2660
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2448

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Media Center Programs\MULTID~1.JS

      Filesize

      45.7MB

      MD5

      1dbf3d603510feb89fba38da1f0fa84a

      SHA1

      5fcf961ba536716163898bc3d76a48d997f79ccd

      SHA256

      b41083520e4a8f135318d6250d72d50479fdb8b020abd2a9237dcd2dd7760158

      SHA512

      f0ddf807571868f89317f7b87b82644821fa29a87f643090ec80504f7f61fbfec014f0aaa403cb0d0f6eaf339416c95903cf66742599d8d35c5f012256cc6fef

    • memory/2448-7-0x000000001B5A0000-0x000000001B882000-memory.dmp

      Filesize

      2.9MB

    • memory/2448-8-0x0000000002810000-0x0000000002818000-memory.dmp

      Filesize

      32KB