Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-10-2024 14:12
Static task
static1
Behavioral task
behavioral1
Sample
proof of payment.js
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
proof of payment.js
Resource
win10v2004-20241007-en
General
-
Target
proof of payment.js
-
Size
201KB
-
MD5
afde4b4922541cf3d76e9ca92e350a54
-
SHA1
66c54cdae7d65a72546f41f4a3017493c5dd114e
-
SHA256
645badafa1c11566e044d0fa3ce25fd3ec3f33503bb562c447a332ed0fe8cd1f
-
SHA512
819b8d1b573fde92137643f85d30cbf1cb1b7c9818eb7c6af81d0ee7d9bed80cef14cbbfb943b1201128d6e21152f8fe0ed0dfef1c0465e268be4f885f614de0
-
SSDEEP
6144:KQSVeE40HtiBbDOtSkOSk7J3sArv5PNb/WwenMkcrB8PKoSO:ZSVeE4kYOPqZrRPNiwCpcrB8PKoSO
Malware Config
Signatures
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
wscript.exedescription pid Process procid_target PID 2436 wrote to memory of 2100 2436 wscript.exe 31 PID 2436 wrote to memory of 2100 2436 wscript.exe 31 PID 2436 wrote to memory of 2100 2436 wscript.exe 31
Processes
-
C:\Windows\system32\wscript.exewscript.exe "C:\Users\Admin\AppData\Local\Temp\proof of payment.js"1⤵
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\rszhup.txt"2⤵PID:2100
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD57b51be77942ed021489dbf24edec3de0
SHA187c16cedede053c98a0e8ee17ffbfdeb8525071b
SHA256489004af1fd6085da359ab80ecce733e9bda9d5f7ddf08edcd5ae38a24826177
SHA5125590644bcebbebd12d597ab11a5fe6fa584800ca8eda8cea45b5bd5b81bccccc92a1f5362282b74934f68ce5820bb6cd89c5e43cf328445105c42d4367194706