Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
24-06-2024 08:53
Static task
static1
Behavioral task
behavioral1
Sample
ZILCORP_POP.js
Resource
win7-20231129-en
General
-
Target
ZILCORP_POP.js
-
Size
424KB
-
MD5
228ffb4e92fdb79da09e379168d28b7d
-
SHA1
00ab295a54b2a2892dc9a178be819c8cf6648ed0
-
SHA256
93b921e53498e0ce61fa8740e083f55a10d72b0b9a406cdb05a9860ffcc94eb9
-
SHA512
6c3c76b0294a9a5ac2c55f03c0524d9ac5a037c5f374c1a80aa6e15d6f4f1068b65d9db0460e5d37becb06709c414c3f2c81060d76dbf7077fc46330f1b066c9
-
SSDEEP
6144:XQqj5e5byQl5AQE/fGn+Z+8sE1mTzJh2gIABvxOsMUURJNOkk52dUe:g3VlS2+4vKCzbtB5Os/r2dUe
Malware Config
Signatures
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2968 2316 wscript.exe 28 PID 2316 wrote to memory of 2968 2316 wscript.exe 28 PID 2316 wrote to memory of 2968 2316 wscript.exe 28
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\ZILCORP_POP.js1⤵
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\wtcwghzm.txt"2⤵PID:2968
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
202KB
MD54c6cadc27c84e3c1cc0e0a02eedf70b4
SHA16744f248d56276d11eb2a4b72e0bf83b56088510
SHA256ea567fa68562fae02b4ca07fb22a4aab17a2970b2083c4fe65a5bad3a9324dd4
SHA512f14f1ef647b573fa016b5fb84130a18018814a00c31ce9f48dc2e701cbd693ca1655f2d76905f3cd89cdf84927708c5abefc58561991701e8028da0f927a6be3