Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-09-2024 15:02
Static task
static1
Behavioral task
behavioral1
Sample
2a795381c3f24bb2dff736aee0688aa59b175e298d80c0c9a07641494c44c6a1.js
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2a795381c3f24bb2dff736aee0688aa59b175e298d80c0c9a07641494c44c6a1.js
Resource
win10v2004-20240802-en
General
-
Target
2a795381c3f24bb2dff736aee0688aa59b175e298d80c0c9a07641494c44c6a1.js
-
Size
205KB
-
MD5
0696c7901122e77fa14c809f27a6aad9
-
SHA1
19d3756f324115ab95132fe51af131139b172464
-
SHA256
2a795381c3f24bb2dff736aee0688aa59b175e298d80c0c9a07641494c44c6a1
-
SHA512
a0fe885d56e0ee25648bfa67fc5b60220d224a29e1f11f456a6451a104b0b752ab534962dfffa143f0c2b9617e8472cec8822863ae78ae53e42f322651e37524
-
SSDEEP
6144:HQblscPp7Odm/khWV/wUS5rxvUbwFpzBy3PhiZaWUcvitF:waOLkMILxLs3PhiZaWUcviL
Malware Config
Signatures
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
wscript.exedescription pid Process procid_target PID 268 wrote to memory of 2284 268 wscript.exe 31 PID 268 wrote to memory of 2284 268 wscript.exe 31 PID 268 wrote to memory of 2284 268 wscript.exe 31
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\2a795381c3f24bb2dff736aee0688aa59b175e298d80c0c9a07641494c44c6a1.js1⤵
- Suspicious use of WriteProcessMemory
PID:268 -
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\snrqdzmcqz.txt"2⤵PID:2284
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD52cc7e15396dc275497fcf51f461da38d
SHA16fa0f11b6d9e3812a86ff1d43a86ad34bfc41062
SHA256e14f1c7e11a1f1ddd570d605e4204a694a7370d603c1b1ca157e505f180ccc48
SHA512daf71473c48f9592d33a49ff2f6d7b84e2c3a992f18a29979494cae86623328f0137c6ae9046cf3bbeb75d90d2a030d1fdbf3aca8718ea769429ce1e6e4a931f