Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
30-05-2024 06:25
Static task
static1
Behavioral task
behavioral1
Sample
OrderDetails.js
Resource
win7-20240419-en
General
-
Target
OrderDetails.js
-
Size
844KB
-
MD5
6a1c5084f6ab9730c978f152934ea415
-
SHA1
70bfed071fdd2bd7d2e17a26703b922f9fb59198
-
SHA256
d3a09982471977a805269a08024fa2c6881385a219a7db0e198ed10829f68147
-
SHA512
cc08032544a97cb69a725b3c23e99999b528da3adc240745c79d3c4f65eb2481b30f04d3a1a140119c900bac1fa01c47eee0f09ef27a963761df749c0ea9f686
-
SSDEEP
1536:XQX3Q+psvIc+PY6t+ZF90EPTY1feon8ZagilDc8G5AyYWuVBoEFgJd2OVmDSW4CU:XQHV6PNS9KiWEqESW46g
Malware Config
Signatures
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3000 wrote to memory of 1720 3000 wscript.exe 28 PID 3000 wrote to memory of 1720 3000 wscript.exe 28 PID 3000 wrote to memory of 1720 3000 wscript.exe 28
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\OrderDetails.js1⤵
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\pvfmwuv.txt"2⤵PID:1720
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD52cc7e15396dc275497fcf51f461da38d
SHA16fa0f11b6d9e3812a86ff1d43a86ad34bfc41062
SHA256e14f1c7e11a1f1ddd570d605e4204a694a7370d603c1b1ca157e505f180ccc48
SHA512daf71473c48f9592d33a49ff2f6d7b84e2c3a992f18a29979494cae86623328f0137c6ae9046cf3bbeb75d90d2a030d1fdbf3aca8718ea769429ce1e6e4a931f