Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-11-2024 06:55
Static task
static1
Behavioral task
behavioral1
Sample
SWIFT-MT103-17112024.js
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
SWIFT-MT103-17112024.js
Resource
win10v2004-20241007-en
General
-
Target
SWIFT-MT103-17112024.js
-
Size
240KB
-
MD5
ee561cb65c1c091022c0fc74326ed6e1
-
SHA1
0c7451bdeaf769da591e070537472d2514f138eb
-
SHA256
e95b00e2410e59526ac95bcd640eb1a8a2e9da7489d9db146d7bc2fe8742b3cf
-
SHA512
d349da1e356830d3109262f683f0d7b27da98ad56bd07ad43849fc712cd8c1985e23b5639a07fbe9717a70736844cd8df20b7411985ebbb43f397c1700585d38
-
SSDEEP
6144:eQLk79lpKjq/aJYrMfy7wJfVm642LbIXSBFfAfx1:1LwAz6kFueIXCIfP
Malware Config
Signatures
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
wscript.exedescription pid process target process PID 2068 wrote to memory of 2124 2068 wscript.exe javaw.exe PID 2068 wrote to memory of 2124 2068 wscript.exe javaw.exe PID 2068 wrote to memory of 2124 2068 wscript.exe javaw.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\SWIFT-MT103-17112024.js1⤵
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\ifvbp.txt"2⤵PID:2124
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
109KB
MD57a5c4c8206af87ef76588eaa1fab0060
SHA130a4b99d4a65cf9bd7997fe2365bf677b7849a54
SHA256e70bb96d50cb6319c4da5972c986dd4732ab6c4c78af96687454ffdb95b56b4b
SHA512352b5dc4081928a713ea79c761752c0e2ef5f4cdfc5e2426f9e2643ee0a490415d27d29f92373ba8e463b773f3e2b0e5236336673ce0b27f68bed3b3c3a3a7fe