Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-10-2024 10:11
Static task
static1
Behavioral task
behavioral1
Sample
URGENT PAYMENT REQUEST.js
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
URGENT PAYMENT REQUEST.js
Resource
win10v2004-20240802-en
General
-
Target
URGENT PAYMENT REQUEST.js
-
Size
455KB
-
MD5
e6c000051f40808e93931bfdf2c5256e
-
SHA1
d4777746ee558788c4d22c68df4ad699dcc2cd14
-
SHA256
835bc4b59c124c2c28fd98acd9a8d6d43cb76f9859277b470a75d87e6b97d7f3
-
SHA512
da811bbdbbc7bb5c52fdfd6d902af0b5e7c7e1d139db399adcb8eb3bc6530f111548eaa091850f923d05ceb8b15f636a637b402cb9d2d8763a309e9f0891c25c
-
SSDEEP
12288:wCcDYnaA2meIGJZakKOeZbZV0aJGeORhYj5AbaQW5Io9ST7:wDYh2mQakKpP9KOJU
Malware Config
Signatures
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
wscript.exedescription pid process target process PID 2996 wrote to memory of 2744 2996 wscript.exe javaw.exe PID 2996 wrote to memory of 2744 2996 wscript.exe javaw.exe PID 2996 wrote to memory of 2744 2996 wscript.exe javaw.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe "C:\Users\Admin\AppData\Local\Temp\URGENT PAYMENT REQUEST.js"1⤵
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\mmvyukuqz.txt"2⤵PID:2744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
209KB
MD59253a3ae8d339ad044eddacb81295060
SHA127d8793f419328ea690734e7b5c4c4c1287fad3f
SHA2565269f44114815dbe9d98fbc756da86969b056b4d7362c9c96d8c58dd17be161c
SHA512fca47b36359817e769064f9b8c3d4b36ffa5e6bbba3904f06cb2c3bf7b21fa1332be506b7e45754b6c884d6d2e12da64c3bea66fc15b8baea8312b29578c557c