Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/05/2024, 05:11
Static task
static1
Behavioral task
behavioral1
Sample
Invoice & PL.js
Resource
win7-20240221-en
General
-
Target
Invoice & PL.js
-
Size
346KB
-
MD5
6e5f677f16815e0933d379f50581bea6
-
SHA1
2f5416c1927fb6b81241bb96eee69befa31b55f9
-
SHA256
68ba175a6363ed62824fb066933974588127b63d007f00b9f147845cebae45db
-
SHA512
727919e1be0223607964997a6951c6d117ef51c9eca4cb38de9834f7e7dd56eaa5bd0aafb6f3a9774103c8d9fc0bc155f9fa09abf2416e773673e77ba62548ff
-
SSDEEP
6144:VqawNPADGrly8y0L5+zf+S1gWpfu61c74xBBKLrUei1nOb+qgJHOAPk4YEUV18E:oNPAyobfu6A5rTb+TXPrwl
Malware Config
Signatures
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1368 wrote to memory of 1396 1368 wscript.exe 28 PID 1368 wrote to memory of 1396 1368 wscript.exe 28 PID 1368 wrote to memory of 1396 1368 wscript.exe 28
Processes
-
C:\Windows\system32\wscript.exewscript.exe "C:\Users\Admin\AppData\Local\Temp\Invoice & PL.js"1⤵
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\clprblturz.txt"2⤵PID:1396
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
164KB
MD56f59762675a1043ce3d52145c4fca3b5
SHA1e98851b70a4f1b413599ed7e848d4128d66f7d16
SHA25619a1796f53aed8daf769cb5adc2fdec81bd3cd7b6f5a3a746bd41c97e1eea44c
SHA512067c3d2e9c931cee28c0f5bf63fa0cc3a66b0060b23316aee8320a4383e54bcdd69d97bc7d29423249ff6e711ef7c05f246d689529663c18c00d11bb61742d00