Malware Analysis Report

2024-12-07 15:20

Sample ID 241113-yylvzsyepq
Target r6ervhapdg
SHA256 908f13c6f7b4978b736d329a1926edc9e4e8794ff8ba923ef3dcee9dffe8f5d9
Tags
execution
score
3/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
3/10

SHA256

908f13c6f7b4978b736d329a1926edc9e4e8794ff8ba923ef3dcee9dffe8f5d9

Threat Level: Likely benign

The file r6ervhapdg was found to be: Likely benign.

Malicious Activity Summary

execution

Command and Scripting Interpreter: JavaScript

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-11-13 20:11

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-11-13 20:11

Reported

2024-11-13 20:48

Platform

win11-20241007-en

Max time kernel

1341s

Max time network

1154s

Command Line

wscript.exe C:\Users\Admin\AppData\Local\Temp\r6ervhapdg.js

Signatures

Command and Scripting Interpreter: JavaScript

execution

Processes

C:\Windows\system32\wscript.exe

wscript.exe C:\Users\Admin\AppData\Local\Temp\r6ervhapdg.js

Network

Country Destination Domain Proto
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp

Files

N/A