Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-10-2024 14:12
Static task
static1
Behavioral task
behavioral1
Sample
proof of payment.js
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
proof of payment.js
Resource
win10v2004-20241007-en
General
-
Target
proof of payment.js
-
Size
205KB
-
MD5
b60592cb963de5d1cb804db6c07dd289
-
SHA1
20c09f859df663850c5f6ec109bc9a5a2831c022
-
SHA256
c31cee51acf037dd2a09dd6dfddc5e889df9646af5625f827007c5b795b0dbb6
-
SHA512
253537ea93ebf4c2decacea5a99ef1b7351d839498f690357a9ce6bc57baf2835b40cc7a7d4819a0e69cdfabea28290c0b6f3ea6c71971ca99967c789a59e251
-
SSDEEP
3072:DQGJLNtKFO/4xaWihrT5UAE5mZgyFz+OOdBdlsNzsQVmWp7:DQ6/n/WaWiha95bQz+OOjdMzsQVmWZ
Malware Config
Signatures
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
wscript.exedescription pid Process procid_target PID 2532 wrote to memory of 1724 2532 wscript.exe 30 PID 2532 wrote to memory of 1724 2532 wscript.exe 30 PID 2532 wrote to memory of 1724 2532 wscript.exe 30
Processes
-
C:\Windows\system32\wscript.exewscript.exe "C:\Users\Admin\AppData\Local\Temp\proof of payment.js"1⤵
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\sxrwnpiqmr.txt"2⤵PID:1724
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD57b51be77942ed021489dbf24edec3de0
SHA187c16cedede053c98a0e8ee17ffbfdeb8525071b
SHA256489004af1fd6085da359ab80ecce733e9bda9d5f7ddf08edcd5ae38a24826177
SHA5125590644bcebbebd12d597ab11a5fe6fa584800ca8eda8cea45b5bd5b81bccccc92a1f5362282b74934f68ce5820bb6cd89c5e43cf328445105c42d4367194706