Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11-05-2024 07:53
Static task
static1
Behavioral task
behavioral1
Sample
f224a2adc08aef0c0fc1899d4ba8aa52e3c608ef2b294dec6d72590dfcb91614.js
Resource
win7-20240221-en
General
-
Target
f224a2adc08aef0c0fc1899d4ba8aa52e3c608ef2b294dec6d72590dfcb91614.js
-
Size
443KB
-
MD5
cdc0ff3b2e6bd8e1a0d09ff010c2c899
-
SHA1
e15ab2d20673e273eb9698894c9f1ef07a893999
-
SHA256
f224a2adc08aef0c0fc1899d4ba8aa52e3c608ef2b294dec6d72590dfcb91614
-
SHA512
787ea82b4404ff50f77f18b36f60071551e8a80810e52d92fac6c89e06baa66bb3d0f09970c5a043273416a3aa92b99b74ae8e2a1f6d66f30c1bd92a282deea9
-
SSDEEP
6144:ZQOOkQsu5kVH5fRAZmyUzxDRqns5D9rmqJ1UnYUB48xM91Y1WziypzkAkaM1kxKm:HVuGZq6xDk8H1cYm48xMYCkbprC
Malware Config
Signatures
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
wscript.exejavaw.exewscript.exedescription pid process target process PID 848 wrote to memory of 2700 848 wscript.exe javaw.exe PID 848 wrote to memory of 2700 848 wscript.exe javaw.exe PID 848 wrote to memory of 2700 848 wscript.exe javaw.exe PID 2700 wrote to memory of 2716 2700 javaw.exe wscript.exe PID 2700 wrote to memory of 2716 2700 javaw.exe wscript.exe PID 2700 wrote to memory of 2716 2700 javaw.exe wscript.exe PID 2716 wrote to memory of 2676 2716 wscript.exe javaw.exe PID 2716 wrote to memory of 2676 2716 wscript.exe javaw.exe PID 2716 wrote to memory of 2676 2716 wscript.exe javaw.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\f224a2adc08aef0c0fc1899d4ba8aa52e3c608ef2b294dec6d72590dfcb91614.js1⤵
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\stutlqyqqb.txt"2⤵
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\system32\wscript.exewscript C:\Users\Admin\pnjtiaccyf.js3⤵
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\lqcirozgxu.txt"4⤵PID:2676
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
164KB
MD5263238ba3312613146a92ecfad5f5abb
SHA157d076f1deb30314bdef4d7e4795068957c8c0d0
SHA2564a464631cf3f7f3261f79fc443dd63d0d205806077e33e9ea1477134d2f7c723
SHA512baaa069e01cf004eec72569fb49312dcf2b1bdac304b6c2e003a926f052c71708e2e704a14e81fbdaabbb01067c61f295bca1c97dfd2fef8ebc2b055eb12f9c4
-
Filesize
219KB
MD5dc460eff6b011dad319db62115365f3a
SHA1112909f254ae16361a6f3dfe757f45896fa8f522
SHA2568d1f7af142e64bcc42117302ce5c20a1e8cce37485f5f8948f006924498cd997
SHA512d8ed4c60a35a8be32cd391c4c356f53bedbb2f59b20061f01a0aa751091fcb367799ffab266ad9ca33ef677fe12d30811991b4641c4519aeea073a095cc74d18
-
Filesize
347KB
MD54ab0c7385d9202a8aed07e0086d83711
SHA1987d7102a8585fde7412554732d7974159e007fa
SHA2565eb64fbe30ab5c8d68fd358f31f9f3cf9c2cb52032a1736a4b327a3d02d8bd0a
SHA512c53ffb22e9dba04607c6648c4b6dd3195eaedbf73ce6b0f065aa116db1e6188b5096b53f281e02486e0b0f8f7e407870c050465902566f4701ce511ed4631682