Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
09-05-2024 02:07
Static task
static1
Behavioral task
behavioral1
Sample
dc6aeb1f8d342bc7863a71083222cfa544b340c181e2be87dd39f5d25aac12e4.js
Resource
win7-20240508-en
General
-
Target
dc6aeb1f8d342bc7863a71083222cfa544b340c181e2be87dd39f5d25aac12e4.js
-
Size
352KB
-
MD5
e38d8e75f11cf191e173aa3e2528b57a
-
SHA1
0e7e3b6ca4118660adb1ad6cfa238613458c5245
-
SHA256
dc6aeb1f8d342bc7863a71083222cfa544b340c181e2be87dd39f5d25aac12e4
-
SHA512
a8d2e021f69c22918972b505b742c06ed0aed4003adef538853b68d55647a17e089828b8bc85c2e57feb7f92962dd5aa671f9a58635dbc49b7baf753ca96c176
-
SSDEEP
6144:J0pVKGI89xY7aXi0rp+/UHXoh4aKfo3DuWmeZRgUCJeyIFhzKcvz30DBaDvzMvh:CVKa9xxs4/YzrZvz3hjzs
Malware Config
Signatures
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2940 wrote to memory of 2624 2940 wscript.exe 28 PID 2940 wrote to memory of 2624 2940 wscript.exe 28 PID 2940 wrote to memory of 2624 2940 wscript.exe 28
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\dc6aeb1f8d342bc7863a71083222cfa544b340c181e2be87dd39f5d25aac12e4.js1⤵
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\kpjjelzns.txt"2⤵PID:2624
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
164KB
MD5295d34a469ee2519f8016d7a8c794a2c
SHA1eaa4737386928dffc355967c213dd19bbf2208d0
SHA256c97d01edc6e28bb1a808951f917290831bd806f5155affe62fb042bbea235bf1
SHA512677d63b1a19b41be1122f3d4c7839377678229907a8e9998d1057ba99e8677c4f5585c679ef40586ba26647b771fbc3db854c1c0b588c51d25bbb9134301c875