Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
30-05-2024 01:37
Static task
static1
Behavioral task
behavioral1
Sample
ed0b6130808ed7feb630ab33d8ab2bc27d2292a418eb9e0da253be96182282f2.js
Resource
win7-20240221-en
General
-
Target
ed0b6130808ed7feb630ab33d8ab2bc27d2292a418eb9e0da253be96182282f2.js
-
Size
847KB
-
MD5
df72b6093c6815d39358aacea690f07a
-
SHA1
63ee37b0cd1b4dc3855b94c6a6f5805bd86388fb
-
SHA256
ed0b6130808ed7feb630ab33d8ab2bc27d2292a418eb9e0da253be96182282f2
-
SHA512
cbadc902a129e862262f2d9d0fdf108fe6267097de9d2f0539df293025a815294346e514d62655defc97d8b856027336255a883b018793a9b33c598644b45324
-
SSDEEP
6144:XQTEI4vwybyl9DK/LiuM0bwucacoS1tGDKMnMcoeNFVZiMeDPtKefB3EenWDiM12:gZ
Malware Config
Signatures
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1580 wrote to memory of 2476 1580 wscript.exe 28 PID 1580 wrote to memory of 2476 1580 wscript.exe 28 PID 1580 wrote to memory of 2476 1580 wscript.exe 28
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\ed0b6130808ed7feb630ab33d8ab2bc27d2292a418eb9e0da253be96182282f2.js1⤵
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\xbmazsdgs.txt"2⤵PID:2476
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD52cc7e15396dc275497fcf51f461da38d
SHA16fa0f11b6d9e3812a86ff1d43a86ad34bfc41062
SHA256e14f1c7e11a1f1ddd570d605e4204a694a7370d603c1b1ca157e505f180ccc48
SHA512daf71473c48f9592d33a49ff2f6d7b84e2c3a992f18a29979494cae86623328f0137c6ae9046cf3bbeb75d90d2a030d1fdbf3aca8718ea769429ce1e6e4a931f