Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 01:11
Static task
static1
Behavioral task
behavioral1
Sample
3d3b93e744a9fc154a70b6a6b709be2806598abb2b00db8e51faa55f961f3076.js
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3d3b93e744a9fc154a70b6a6b709be2806598abb2b00db8e51faa55f961f3076.js
Resource
win10v2004-20240508-en
General
-
Target
3d3b93e744a9fc154a70b6a6b709be2806598abb2b00db8e51faa55f961f3076.js
-
Size
262KB
-
MD5
61003ace63f39ed1cc39a22cb924e6b1
-
SHA1
914548e77023a990b0e79e1cea9ce25991e8116e
-
SHA256
3d3b93e744a9fc154a70b6a6b709be2806598abb2b00db8e51faa55f961f3076
-
SHA512
e9d25955a7a9700b996dc435e23505ddb772290bf6370a0ccd122a34fc6c21c935b6a4dfc60fd2d2d00e74e6edb0f6f49d9df960a2ac3b7155a98d908560ba53
-
SSDEEP
96:GM969Xx6VdE6ruU6S+4SWp9uS+V6fXuSEFYcnhVM3/DyBCODI99PRdN1QNLq9Iu/:gWGcucNHw1c5UEWzC423S68XC
Malware Config
Signatures
-
Blocklisted process makes network request 17 IoCs
flow pid Process 30 2588 wscript.exe 31 2588 wscript.exe 45 2588 wscript.exe 46 2588 wscript.exe 47 2588 wscript.exe 48 2588 wscript.exe 56 2588 wscript.exe 58 2588 wscript.exe 59 2588 wscript.exe 62 2588 wscript.exe 63 2588 wscript.exe 75 2588 wscript.exe 76 2588 wscript.exe 77 2588 wscript.exe 78 2588 wscript.exe 79 2588 wscript.exe 80 2588 wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\3d3b93e744a9fc154a70b6a6b709be2806598abb2b00db8e51faa55f961f3076.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\3d3b93e744a9fc154a70b6a6b709be2806598abb2b00db8e51faa55f961f3076.js wscript.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\3d3b93e744a9fc154a70b6a6b709be2806598abb2b00db8e51faa55f961f3076 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\3d3b93e744a9fc154a70b6a6b709be2806598abb2b00db8e51faa55f961f3076.js\"" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\3d3b93e744a9fc154a70b6a6b709be2806598abb2b00db8e51faa55f961f3076 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\3d3b93e744a9fc154a70b6a6b709be2806598abb2b00db8e51faa55f961f3076.js\"" wscript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\3d3b93e744a9fc154a70b6a6b709be2806598abb2b00db8e51faa55f961f3076.js
Filesize262KB
MD561003ace63f39ed1cc39a22cb924e6b1
SHA1914548e77023a990b0e79e1cea9ce25991e8116e
SHA2563d3b93e744a9fc154a70b6a6b709be2806598abb2b00db8e51faa55f961f3076
SHA512e9d25955a7a9700b996dc435e23505ddb772290bf6370a0ccd122a34fc6c21c935b6a4dfc60fd2d2d00e74e6edb0f6f49d9df960a2ac3b7155a98d908560ba53