Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
11-05-2024 08:34
Static task
static1
Behavioral task
behavioral1
Sample
68ba175a6363ed62824fb066933974588127b63d007f00b9f147845cebae45db.js
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
68ba175a6363ed62824fb066933974588127b63d007f00b9f147845cebae45db.js
Resource
win10v2004-20240426-en
General
-
Target
68ba175a6363ed62824fb066933974588127b63d007f00b9f147845cebae45db.js
-
Size
346KB
-
MD5
6e5f677f16815e0933d379f50581bea6
-
SHA1
2f5416c1927fb6b81241bb96eee69befa31b55f9
-
SHA256
68ba175a6363ed62824fb066933974588127b63d007f00b9f147845cebae45db
-
SHA512
727919e1be0223607964997a6951c6d117ef51c9eca4cb38de9834f7e7dd56eaa5bd0aafb6f3a9774103c8d9fc0bc155f9fa09abf2416e773673e77ba62548ff
-
SSDEEP
6144:VqawNPADGrly8y0L5+zf+S1gWpfu61c74xBBKLrUei1nOb+qgJHOAPk4YEUV18E:oNPAyobfu6A5rTb+TXPrwl
Malware Config
Signatures
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
wscript.exedescription pid process target process PID 840 wrote to memory of 1688 840 wscript.exe javaw.exe PID 840 wrote to memory of 1688 840 wscript.exe javaw.exe PID 840 wrote to memory of 1688 840 wscript.exe javaw.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\68ba175a6363ed62824fb066933974588127b63d007f00b9f147845cebae45db.js1⤵
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\xeegbeeyfc.txt"2⤵PID:1688
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
164KB
MD56f59762675a1043ce3d52145c4fca3b5
SHA1e98851b70a4f1b413599ed7e848d4128d66f7d16
SHA25619a1796f53aed8daf769cb5adc2fdec81bd3cd7b6f5a3a746bd41c97e1eea44c
SHA512067c3d2e9c931cee28c0f5bf63fa0cc3a66b0060b23316aee8320a4383e54bcdd69d97bc7d29423249ff6e711ef7c05f246d689529663c18c00d11bb61742d00