Analysis
-
max time kernel
431s -
max time network
433s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
20-09-2024 16:43
Static task
static1
Behavioral task
behavioral1
Sample
RFQ_PO_KMM7983972_ORDER_DETAILS.js
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
RFQ_PO_KMM7983972_ORDER_DETAILS.js
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
RFQ_PO_KMM7983972_ORDER_DETAILS.js
Resource
win10v2004-20240802-en
General
-
Target
RFQ_PO_KMM7983972_ORDER_DETAILS.js
-
Size
4.6MB
-
MD5
cd0f549f054ceab42921cf3979164fcd
-
SHA1
a4045303bdb5b2e5e32e515a29dd3f43fc2cd4c3
-
SHA256
0c3672c680c56eb694c95914c7ea78a7fd0667c8b88c02c9b0b988cb520c3983
-
SHA512
dd614ea2258f39e989922ef48d380cf4530c5f9bd69e724d955f2f5b256a2cdbb7b8c8a9f1e925329553720573f2c4f3b9321b65fbc45e58a5495c562b150f3f
-
SSDEEP
49152:Dy0k7Tbm+wKoJjMRRfQTr95R5NDE97TydtK1B0v3qyPAmYEHgdkgJWyLJe/BG0PF:d
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3112 x.exe 688 x.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral4/files/0x000400000002aab2-4.dat autoit_exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 5036 688 WerFault.exe 80 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language x.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language x.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3112 x.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1416 wrote to memory of 3112 1416 wscript.exe 78 PID 1416 wrote to memory of 3112 1416 wscript.exe 78 PID 1416 wrote to memory of 3112 1416 wscript.exe 78 PID 3112 wrote to memory of 992 3112 x.exe 79 PID 3112 wrote to memory of 992 3112 x.exe 79 PID 3112 wrote to memory of 992 3112 x.exe 79 PID 3112 wrote to memory of 688 3112 x.exe 80 PID 3112 wrote to memory of 688 3112 x.exe 80 PID 3112 wrote to memory of 688 3112 x.exe 80 PID 688 wrote to memory of 4828 688 x.exe 81 PID 688 wrote to memory of 4828 688 x.exe 81 PID 688 wrote to memory of 4828 688 x.exe 81
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\RFQ_PO_KMM7983972_ORDER_DETAILS.js1⤵
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Users\Admin\AppData\Local\Temp\x.exe"C:\Users\Admin\AppData\Local\Temp\x.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\x.exe"3⤵PID:992
-
-
C:\Users\Admin\AppData\Local\Temp\x.exe"C:\Users\Admin\AppData\Local\Temp\x.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:688 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\x.exe"4⤵PID:4828
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 688 -s 7244⤵
- Program crash
PID:5036
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 688 -ip 6881⤵PID:2176
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.5MB
MD516169512f2e05c8e01449e52ea10b525
SHA10724ad3ada6f7b87d0be9fe051da3e50449d9775
SHA2560b232cd5b3cd6d2ba6d618a0bb68711901d2746be6dbdc67df1242459e0e5c5a
SHA5127487faa357cdf96653d84d4b028725fa8650614bf6801ca61c78f2a4f42f8ac288172ae5eaa52365143aaf7edb9fd62ebdc40a6e578b897875eb682f8e299611