Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
27-08-2024 15:17
Static task
static1
Behavioral task
behavioral1
Sample
Proof Of Payment.js
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Proof Of Payment.js
Resource
win10v2004-20240802-en
General
-
Target
Proof Of Payment.js
-
Size
731KB
-
MD5
b55993f3492c21f9e188512ccd01593b
-
SHA1
872f6f8b7bf5adb1236e0657ac2727ec4a71d1cd
-
SHA256
6036de6277ab720dc519c897669131338f618de95f848a7c6f167e51b473bc8a
-
SHA512
65d8f960d98f67a057652249458c296791bcc90f67ae4a057dab9047846e9c0b125fc59ce8dc15c3e42ad9e1201d581a705a40d3a8fa5a1da9ed204881c054f1
-
SSDEEP
6144:XQ/YI2TgEcljvq7ZZomevlr0gWl5sMWTVJNnabZGmWH9TJ5KIOykMLDMfjnGhjdL:gV
Malware Config
Signatures
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
wscript.exedescription pid Process procid_target PID 2884 wrote to memory of 2212 2884 wscript.exe 30 PID 2884 wrote to memory of 2212 2884 wscript.exe 30 PID 2884 wrote to memory of 2212 2884 wscript.exe 30
Processes
-
C:\Windows\system32\wscript.exewscript.exe "C:\Users\Admin\AppData\Local\Temp\Proof Of Payment.js"1⤵
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\gaiyfoano.txt"2⤵PID:2212
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD52cc7e15396dc275497fcf51f461da38d
SHA16fa0f11b6d9e3812a86ff1d43a86ad34bfc41062
SHA256e14f1c7e11a1f1ddd570d605e4204a694a7370d603c1b1ca157e505f180ccc48
SHA512daf71473c48f9592d33a49ff2f6d7b84e2c3a992f18a29979494cae86623328f0137c6ae9046cf3bbeb75d90d2a030d1fdbf3aca8718ea769429ce1e6e4a931f