Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-09-2024 15:09
Static task
static1
Behavioral task
behavioral1
Sample
Proof Of Payment.js
Resource
win7-20240903-en
General
-
Target
Proof Of Payment.js
-
Size
210KB
-
MD5
998f56502dcef7e0f79005a15b347369
-
SHA1
9e95598310cbdc5539dfd87f9aa535ac45453082
-
SHA256
aa32cd6ebf65a0a27f1c0acb9958cc7557db7f2d32da89d288ca60d77f8dc66c
-
SHA512
f24afdc911f4a9c20acda4b875922ed03b467166e9448fc0559f80b142390e3dfbd552e44500a30fbbe9654a0530e489a177d67c507171e239cf00e1c230d747
-
SSDEEP
6144:HQGpYsLdKl0dTvG7ma45y36H+DvTsnLJ+DwNa:w+nFYYLBg
Malware Config
Signatures
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
wscript.exedescription pid process target process PID 3040 wrote to memory of 2756 3040 wscript.exe javaw.exe PID 3040 wrote to memory of 2756 3040 wscript.exe javaw.exe PID 3040 wrote to memory of 2756 3040 wscript.exe javaw.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe "C:\Users\Admin\AppData\Local\Temp\Proof Of Payment.js"1⤵
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\ercgdflz.txt"2⤵PID:2756
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD52cc7e15396dc275497fcf51f461da38d
SHA16fa0f11b6d9e3812a86ff1d43a86ad34bfc41062
SHA256e14f1c7e11a1f1ddd570d605e4204a694a7370d603c1b1ca157e505f180ccc48
SHA512daf71473c48f9592d33a49ff2f6d7b84e2c3a992f18a29979494cae86623328f0137c6ae9046cf3bbeb75d90d2a030d1fdbf3aca8718ea769429ce1e6e4a931f