Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
31-05-2024 08:15
Static task
static1
Behavioral task
behavioral1
Sample
Request For Quotation.js
Resource
win7-20240221-en
General
-
Target
Request For Quotation.js
-
Size
776KB
-
MD5
1d26836dd11e3edf4982cac936614871
-
SHA1
6a1d15f15eea691da47b0a2b0a326fea2be3539d
-
SHA256
f258e1a04ad4cc71b7dd2c4f88b7534c0ca5f15163d6c76dfdb3a82a5d1abf02
-
SHA512
1371926913b860c5c798080c0c4563ec92b9555495e0d1f629cd536cb432fc9cf97a12c2e8c467e7a845daafe91ef30a223b65841059edcf5c9786ffb0cb37f4
-
SSDEEP
6144:XQzJeftRXJpA2OEL42YdLHmaNFq5fC1il2gzLKDvlQCxhGgmRR7L/xrE6AUbDlc3:g/
Malware Config
Signatures
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2860 wrote to memory of 2796 2860 wscript.exe 28 PID 2860 wrote to memory of 2796 2860 wscript.exe 28 PID 2860 wrote to memory of 2796 2860 wscript.exe 28
Processes
-
C:\Windows\system32\wscript.exewscript.exe "C:\Users\Admin\AppData\Local\Temp\Request For Quotation.js"1⤵
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\lwjiysorw.txt"2⤵PID:2796
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD52cc7e15396dc275497fcf51f461da38d
SHA16fa0f11b6d9e3812a86ff1d43a86ad34bfc41062
SHA256e14f1c7e11a1f1ddd570d605e4204a694a7370d603c1b1ca157e505f180ccc48
SHA512daf71473c48f9592d33a49ff2f6d7b84e2c3a992f18a29979494cae86623328f0137c6ae9046cf3bbeb75d90d2a030d1fdbf3aca8718ea769429ce1e6e4a931f