Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03-10-2024 10:11

General

  • Target

    URGENT PAYMENT REQUEST.js

  • Size

    455KB

  • MD5

    e6c000051f40808e93931bfdf2c5256e

  • SHA1

    d4777746ee558788c4d22c68df4ad699dcc2cd14

  • SHA256

    835bc4b59c124c2c28fd98acd9a8d6d43cb76f9859277b470a75d87e6b97d7f3

  • SHA512

    da811bbdbbc7bb5c52fdfd6d902af0b5e7c7e1d139db399adcb8eb3bc6530f111548eaa091850f923d05ceb8b15f636a637b402cb9d2d8763a309e9f0891c25c

  • SSDEEP

    12288:wCcDYnaA2meIGJZakKOeZbZV0aJGeORhYj5AbaQW5Io9ST7:wDYh2mQakKpP9KOJU

Score
3/10

Malware Config

Signatures

  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe "C:\Users\Admin\AppData\Local\Temp\URGENT PAYMENT REQUEST.js"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2996
    • C:\Program Files\Java\jre7\bin\javaw.exe
      "C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\mmvyukuqz.txt"
      2⤵
        PID:2744

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\mmvyukuqz.txt

      Filesize

      209KB

      MD5

      9253a3ae8d339ad044eddacb81295060

      SHA1

      27d8793f419328ea690734e7b5c4c4c1287fad3f

      SHA256

      5269f44114815dbe9d98fbc756da86969b056b4d7362c9c96d8c58dd17be161c

      SHA512

      fca47b36359817e769064f9b8c3d4b36ffa5e6bbba3904f06cb2c3bf7b21fa1332be506b7e45754b6c884d6d2e12da64c3bea66fc15b8baea8312b29578c557c

    • memory/2744-4-0x0000000002560000-0x00000000027D0000-memory.dmp

      Filesize

      2.4MB

    • memory/2744-12-0x0000000000340000-0x0000000000341000-memory.dmp

      Filesize

      4KB

    • memory/2744-19-0x0000000000340000-0x0000000000341000-memory.dmp

      Filesize

      4KB

    • memory/2744-21-0x0000000000340000-0x0000000000341000-memory.dmp

      Filesize

      4KB

    • memory/2744-26-0x0000000000340000-0x0000000000341000-memory.dmp

      Filesize

      4KB

    • memory/2744-35-0x0000000000340000-0x0000000000341000-memory.dmp

      Filesize

      4KB

    • memory/2744-43-0x0000000000340000-0x0000000000341000-memory.dmp

      Filesize

      4KB

    • memory/2744-52-0x0000000000340000-0x0000000000341000-memory.dmp

      Filesize

      4KB

    • memory/2744-56-0x0000000000340000-0x0000000000341000-memory.dmp

      Filesize

      4KB

    • memory/2744-58-0x0000000000340000-0x0000000000341000-memory.dmp

      Filesize

      4KB

    • memory/2744-59-0x0000000000340000-0x0000000000341000-memory.dmp

      Filesize

      4KB

    • memory/2744-89-0x0000000000340000-0x0000000000341000-memory.dmp

      Filesize

      4KB

    • memory/2744-97-0x0000000002560000-0x00000000027D0000-memory.dmp

      Filesize

      2.4MB

    • memory/2744-102-0x0000000000340000-0x0000000000341000-memory.dmp

      Filesize

      4KB

    • memory/2744-106-0x0000000000340000-0x0000000000341000-memory.dmp

      Filesize

      4KB

    • memory/2744-108-0x0000000000340000-0x0000000000341000-memory.dmp

      Filesize

      4KB

    • memory/2744-109-0x0000000000340000-0x0000000000341000-memory.dmp

      Filesize

      4KB