Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
18-06-2024 09:35
Static task
static1
Behavioral task
behavioral1
Sample
Zilcorp_PayCheck.js
Resource
win7-20240508-en
General
-
Target
Zilcorp_PayCheck.js
-
Size
415KB
-
MD5
b7bef63b1d36f38f696469ace03c61c4
-
SHA1
6354ac040b6fda031ebf37e90eae9eb68b97bd94
-
SHA256
201483f282a58582d9a11ac56491bd74bd25caa0635987297d6cc985f4078bea
-
SHA512
a94833b8df108d34f39c87377ab0f46a81774056e40e45f34e504c25ed7e99e647a4622b30be7096e526e1a359a69c99261f69805cc7e956d8bc4f865a3ffd45
-
SSDEEP
6144:XQ6gcED4sXas+CryilhnTUX5jcniqlSu+yxq3RKN24mR1V3JMV9DLC7:g688sXasSsUXiXEwgLcLC7
Malware Config
Signatures
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
wscript.exedescription pid Process procid_target PID 1932 wrote to memory of 2172 1932 wscript.exe 28 PID 1932 wrote to memory of 2172 1932 wscript.exe 28 PID 1932 wrote to memory of 2172 1932 wscript.exe 28
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\Zilcorp_PayCheck.js1⤵
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\ezvkhwvuj.txt"2⤵PID:2172
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
202KB
MD54c6cadc27c84e3c1cc0e0a02eedf70b4
SHA16744f248d56276d11eb2a4b72e0bf83b56088510
SHA256ea567fa68562fae02b4ca07fb22a4aab17a2970b2083c4fe65a5bad3a9324dd4
SHA512f14f1ef647b573fa016b5fb84130a18018814a00c31ce9f48dc2e701cbd693ca1655f2d76905f3cd89cdf84927708c5abefc58561991701e8028da0f927a6be3