Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
26-05-2024 05:35
Static task
static1
Behavioral task
behavioral1
Sample
Documento-alteraao-11.03.2020.pdf.js
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
Documento-alteraao-11.03.2020.pdf.js
Resource
win10v2004-20240426-en
General
-
Target
Documento-alteraao-11.03.2020.pdf.js
-
Size
11KB
-
MD5
7f7cce8ee185cce9e86e84a6d0885b57
-
SHA1
93337be9638d0edf6798ae01b13b5482d6b26da3
-
SHA256
95620589e26199d5b927ebeeb777042b9efbd2311aaea1c369bdf78a39a89943
-
SHA512
fa873eb30474d4fc9ebe1ef209c8f5bfed9b91712102806e4d6608f1706815dcf293780d4e09e1e1800a6d5f2de61034d7406bcfc5eeef545daa1010e6d9e9e2
-
SSDEEP
192:zeWaZT3p/+yzT++dMpZ7Wp66zRtuXg25EGV3ehAlL+vrBOYf+wF:6ZTZ/+yzTndMpkg6zR0QCeKUvrlvF
Malware Config
Signatures
-
Blocklisted process makes network request 18 IoCs
Processes:
wscript.exeflow pid process 4 2108 wscript.exe 6 2108 wscript.exe 7 2108 wscript.exe 9 2108 wscript.exe 10 2108 wscript.exe 11 2108 wscript.exe 13 2108 wscript.exe 14 2108 wscript.exe 15 2108 wscript.exe 17 2108 wscript.exe 18 2108 wscript.exe 19 2108 wscript.exe 21 2108 wscript.exe 22 2108 wscript.exe 23 2108 wscript.exe 25 2108 wscript.exe 26 2108 wscript.exe 27 2108 wscript.exe -
Drops startup file 1 IoCs
Processes:
wscript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Documento-alteraao-11.03.2020.pdf.js wscript.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
wscript.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\K5DTIQVEYT = "\"C:\\Users\\Admin\\Documento-altera?ao-11.03.2020.pdf.js\"" wscript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
wscript.exedescription pid process target process PID 2108 wrote to memory of 2616 2108 wscript.exe schtasks.exe PID 2108 wrote to memory of 2616 2108 wscript.exe schtasks.exe PID 2108 wrote to memory of 2616 2108 wscript.exe schtasks.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\Documento-alteraao-11.03.2020.pdf.js1⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\Documento-alteraao-11.03.2020.pdf.js2⤵
- Creates scheduled task(s)
PID:2616
-