Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    26-09-2024 07:20

General

  • Target

    RFQ -PO.20571-0001-QBMS-PRQ-0200140.js

  • Size

    4.7MB

  • MD5

    5e1cdaa87915b9b6e7d852c0b7ce272b

  • SHA1

    978f40e995fe1fd0e10f73f8b7924dd31ffb6267

  • SHA256

    3335d593c4a2f7ab94a35fd5a0991026d1800592a18cc842686d3bf6bb66503d

  • SHA512

    94e1811a87af0165989d69732d20f1c00981eeeb15ed976b01ff9afcdd41a38ff201252f8e003bba92541757603c29b80c69c897fc41cab51ad88b7698754425

  • SSDEEP

    49152:Dy0k7TbmSOqsmBdkQUUb/YnBxbb20HelA1mvpxVAm8Zp0v97quF8yAmhR/:2

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of SetThreadContext 1 IoCs
  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe "C:\Users\Admin\AppData\Local\Temp\RFQ -PO.20571-0001-QBMS-PRQ-0200140.js"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3052
    • C:\Users\Admin\AppData\Local\Temp\x.exe
      "C:\Users\Admin\AppData\Local\Temp\x.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2700
      • C:\Windows\SysWOW64\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\x.exe"
        3⤵
          PID:2656

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\x.exe

      Filesize

      3.5MB

      MD5

      e7114d96ec31d8cd1c0233bd949d1e0f

      SHA1

      6433ace48fc9a6d4de4451d0a35c91af7c69d507

      SHA256

      771b160a95fb3bafe050a2e5552a1c697a5982773104c6a2b9549b538935ed23

      SHA512

      66d19fd4eea704b67e5f3568590ebe3ea42cdb0426fa4bafbdb35814f9fac21ac37126e4a3ea238f8dfb8e5cd5c2bdbe4db60a26b72ce3883f40c6ba4d2113d7

    • memory/2656-9-0x0000000000400000-0x0000000000554000-memory.dmp

      Filesize

      1.3MB

    • memory/2700-8-0x0000000004700000-0x0000000004F00000-memory.dmp

      Filesize

      8.0MB