Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    27-09-2024 01:18

General

  • Target

    5709dc35796f2a91483860820770e74dead9f01eaf2433832016fdacd2eed209.js

  • Size

    453KB

  • MD5

    f04f4fb3190c6cd423a4d84cf521cf65

  • SHA1

    9d11423067f7e004d14a3803b3fe2ee046ab3dfd

  • SHA256

    5709dc35796f2a91483860820770e74dead9f01eaf2433832016fdacd2eed209

  • SHA512

    6bf28689632f5c7f8a19e03e3d2efd7af34f6d6d73f8f78c4b5ae97f7af051e85cbaac40640334cfe089337aa0c5388a11ad4e7a71e98841ea67585c710c1162

  • SSDEEP

    12288:woWNEiYoNEy3ND5k6XrhqncWkhLPDS430IR:w4SR5xbWkhLN30s

Score
3/10

Malware Config

Signatures

  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\5709dc35796f2a91483860820770e74dead9f01eaf2433832016fdacd2eed209.js
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2980
    • C:\Program Files\Java\jre7\bin\javaw.exe
      "C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\kcwoey.txt"
      2⤵
        PID:2664

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\kcwoey.txt

      Filesize

      209KB

      MD5

      337db9434c13692b630511cb9a09ac0c

      SHA1

      414b08bda16868e47eac31909befbb5ae8bdd658

      SHA256

      ade8c69bb2bfdf28b1f39c37f0409788e0a3cd41e68838ea7b642f998ff3fd4d

      SHA512

      9fa7f3b07a5de778dc1db202c5880c331a1c975f2bb0f40659c4f6f173326643c8cb3516fc260e458dd8d62b5eac2c5acad1a54db20d8b092c38f09ef86b3b7c

    • memory/2664-4-0x0000000002600000-0x0000000002870000-memory.dmp

      Filesize

      2.4MB

    • memory/2664-12-0x0000000000230000-0x0000000000231000-memory.dmp

      Filesize

      4KB

    • memory/2664-19-0x0000000000230000-0x0000000000231000-memory.dmp

      Filesize

      4KB

    • memory/2664-26-0x0000000000230000-0x0000000000231000-memory.dmp

      Filesize

      4KB

    • memory/2664-34-0x0000000000230000-0x0000000000231000-memory.dmp

      Filesize

      4KB

    • memory/2664-36-0x0000000000230000-0x0000000000231000-memory.dmp

      Filesize

      4KB

    • memory/2664-40-0x0000000000230000-0x0000000000231000-memory.dmp

      Filesize

      4KB

    • memory/2664-41-0x0000000000230000-0x0000000000231000-memory.dmp

      Filesize

      4KB

    • memory/2664-43-0x0000000000230000-0x0000000000231000-memory.dmp

      Filesize

      4KB

    • memory/2664-47-0x0000000000230000-0x0000000000231000-memory.dmp

      Filesize

      4KB

    • memory/2664-49-0x0000000000230000-0x0000000000231000-memory.dmp

      Filesize

      4KB

    • memory/2664-51-0x0000000000230000-0x0000000000231000-memory.dmp

      Filesize

      4KB

    • memory/2664-53-0x0000000000230000-0x0000000000231000-memory.dmp

      Filesize

      4KB

    • memory/2664-56-0x0000000000230000-0x0000000000231000-memory.dmp

      Filesize

      4KB

    • memory/2664-60-0x0000000000230000-0x0000000000231000-memory.dmp

      Filesize

      4KB

    • memory/2664-62-0x0000000000230000-0x0000000000231000-memory.dmp

      Filesize

      4KB

    • memory/2664-64-0x0000000000230000-0x0000000000231000-memory.dmp

      Filesize

      4KB

    • memory/2664-65-0x0000000000230000-0x0000000000231000-memory.dmp

      Filesize

      4KB

    • memory/2664-200-0x0000000002600000-0x0000000002870000-memory.dmp

      Filesize

      2.4MB