Analysis
-
max time kernel
121s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 05:00
Static task
static1
Behavioral task
behavioral1
Sample
50ba244f113f398afc39ed760e2c3822fdc82147259e9846df5abab89cf8307f.js
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
50ba244f113f398afc39ed760e2c3822fdc82147259e9846df5abab89cf8307f.js
Resource
win10v2004-20241007-en
General
-
Target
50ba244f113f398afc39ed760e2c3822fdc82147259e9846df5abab89cf8307f.js
-
Size
52KB
-
MD5
b9f2fc5e874114e45330cad7b524476c
-
SHA1
f158badcc637d7d92efb7ef63a6f8783a886ac6b
-
SHA256
50ba244f113f398afc39ed760e2c3822fdc82147259e9846df5abab89cf8307f
-
SHA512
dbbd63c7bd8b4a6723fd170e74e4c6532a6a89cca37c4580566585bb645711e7da05bfa37eb5ff7aac1683943b833bc4210a04959789e3e284d5d9dcf6e556a8
-
SSDEEP
768:EGWR269T41RPhQ3uvuGNhUP9KU2c0WuPIFXRomYO:Jh6d4wcTMgyBomYO
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\a.txt
1GgLeHpXUqeapoK3wvev1HyrCPEjvYKfyG
http://ohchinhing.com.sg/counter/?a=1GgLeHpXUqeapoK3wvev1HyrCPEjvYKfyG
http://bloki.internetdsl.pl/counter/?a=1GgLeHpXUqeapoK3wvev1HyrCPEjvYKfyG
http://crobal-water.com/counter/?a=1GgLeHpXUqeapoK3wvev1HyrCPEjvYKfyG
http://stroydek.ru/counter/?a=1GgLeHpXUqeapoK3wvev1HyrCPEjvYKfyG
http://www.cuihuangge.com/counter/?a=1GgLeHpXUqeapoK3wvev1HyrCPEjvYKfyG
Signatures
-
Blocklisted process makes network request 7 IoCs
flow pid Process 5 2096 wscript.exe 6 2096 wscript.exe 8 2096 wscript.exe 10 2096 wscript.exe 12 2096 wscript.exe 14 2096 wscript.exe 18 2096 wscript.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\Crypted = "C:\\Users\\Admin\\AppData\\Local\\Temp\\a.txt" reg.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 7 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.crypted\ = "Crypted" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Crypted\shell\open\command reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Crypted reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Crypted\shell reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Crypted\shell\open reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Crypted\shell\open\command\ = "notepad.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\a.txt\"" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.crypted reg.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2708 notepad.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 2096 wrote to memory of 1820 2096 wscript.exe 32 PID 2096 wrote to memory of 1820 2096 wscript.exe 32 PID 2096 wrote to memory of 1820 2096 wscript.exe 32 PID 2096 wrote to memory of 904 2096 wscript.exe 33 PID 2096 wrote to memory of 904 2096 wscript.exe 33 PID 2096 wrote to memory of 904 2096 wscript.exe 33 PID 2096 wrote to memory of 1740 2096 wscript.exe 35 PID 2096 wrote to memory of 1740 2096 wscript.exe 35 PID 2096 wrote to memory of 1740 2096 wscript.exe 35 PID 2096 wrote to memory of 324 2096 wscript.exe 37 PID 2096 wrote to memory of 324 2096 wscript.exe 37 PID 2096 wrote to memory of 324 2096 wscript.exe 37 PID 2096 wrote to memory of 1924 2096 wscript.exe 40 PID 2096 wrote to memory of 1924 2096 wscript.exe 40 PID 2096 wrote to memory of 1924 2096 wscript.exe 40 PID 2096 wrote to memory of 584 2096 wscript.exe 42 PID 2096 wrote to memory of 584 2096 wscript.exe 42 PID 2096 wrote to memory of 584 2096 wscript.exe 42 PID 904 wrote to memory of 1188 904 cmd.exe 44 PID 904 wrote to memory of 1188 904 cmd.exe 44 PID 904 wrote to memory of 1188 904 cmd.exe 44 PID 1820 wrote to memory of 2888 1820 cmd.exe 45 PID 1820 wrote to memory of 2888 1820 cmd.exe 45 PID 1820 wrote to memory of 2888 1820 cmd.exe 45 PID 1740 wrote to memory of 1704 1740 cmd.exe 46 PID 1740 wrote to memory of 1704 1740 cmd.exe 46 PID 1740 wrote to memory of 1704 1740 cmd.exe 46 PID 2096 wrote to memory of 1908 2096 wscript.exe 48 PID 2096 wrote to memory of 1908 2096 wscript.exe 48 PID 2096 wrote to memory of 1908 2096 wscript.exe 48 PID 2096 wrote to memory of 1756 2096 wscript.exe 50 PID 2096 wrote to memory of 1756 2096 wscript.exe 50 PID 2096 wrote to memory of 1756 2096 wscript.exe 50 PID 2096 wrote to memory of 2260 2096 wscript.exe 52 PID 2096 wrote to memory of 2260 2096 wscript.exe 52 PID 2096 wrote to memory of 2260 2096 wscript.exe 52 PID 2096 wrote to memory of 1952 2096 wscript.exe 55 PID 2096 wrote to memory of 1952 2096 wscript.exe 55 PID 2096 wrote to memory of 1952 2096 wscript.exe 55 PID 1908 wrote to memory of 2708 1908 cmd.exe 54 PID 1908 wrote to memory of 2708 1908 cmd.exe 54 PID 1908 wrote to memory of 2708 1908 cmd.exe 54
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\50ba244f113f398afc39ed760e2c3822fdc82147259e9846df5abab89cf8307f.js1⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Crypted" /t REG_SZ /F /D "C:\Users\Admin\AppData\Local\Temp\a.txt"2⤵
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\system32\reg.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Crypted" /t REG_SZ /F /D "C:\Users\Admin\AppData\Local\Temp\a.txt"3⤵
- Adds Run key to start application
PID:2888
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c REG ADD "HKCR\.crypted" /ve /t REG_SZ /F /D "Crypted"2⤵
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Windows\system32\reg.exeREG ADD "HKCR\.crypted" /ve /t REG_SZ /F /D "Crypted"3⤵
- Modifies registry class
PID:1188
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c REG ADD "HKCR\Crypted\shell\open\command" /ve /t REG_SZ /F /D "notepad.exe \"C:\Users\Admin\AppData\Local\Temp\a.txt\""2⤵
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\system32\reg.exeREG ADD "HKCR\Crypted\shell\open\command" /ve /t REG_SZ /F /D "notepad.exe \"C:\Users\Admin\AppData\Local\Temp\a.txt\""3⤵
- Modifies registry class
PID:1704
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c copy /y "C:\Users\Admin\AppData\Local\Temp\a.txt" "C:\Users\Admin\AppData\Roaming\Desktop\DECRYPT.txt"2⤵PID:324
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c copy /y "C:\Users\Admin\AppData\Local\Temp\a.txt" "C:\Users\Admin\Desktop\DECRYPT.txt"2⤵PID:1924
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\a.exe "C:\Users\Admin\AppData\Local\Temp\a.php"2⤵PID:584
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c notepad.exe "C:\Users\Admin\AppData\Local\Temp\a.txt"2⤵
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\system32\notepad.exenotepad.exe "C:\Users\Admin\AppData\Local\Temp\a.txt"3⤵
- Opens file in notepad (likely ransom note)
PID:2708
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL "C:\Users\Admin\AppData\Local\Temp\a.php"2⤵PID:1756
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL "C:\Users\Admin\AppData\Local\Temp\a.exe"2⤵PID:2260
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL "C:\Users\Admin\AppData\Local\Temp\php4ts.dll"2⤵PID:1952
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\S8GI6B9B\BL3600TF.htm
Filesize1KB
MD56fbd7c29cf69162a0c5213664c2f19c4
SHA1ea8ecaf79bcc408ff176f72e1bded69cda494099
SHA2565bb365f51aa447fc3a3bf92a92c7db8b1d3c655daa138eb466401bfacfa4bf7e
SHA512ee26b9d9265b5cd83598ecc513934397bb10703d224c780a019fa95caeb8835a49a9b7cbc5b26052fda9a181cf734add1643998624dcd566ab8de95a301515ca
-
Filesize
35KB
MD54a980d966affaa603078f39f4eb8efa7
SHA140503a88d86e7a5e94f3c9321022bdf9d84c0d99
SHA2567195fc82c2e220dc9939a96e9ae45a5299b784064e20c5296d97793524f503dd
SHA512eafb5aba7c91520f7f22547a7ff105ae7c91de695eeb1d884c5f638206a9a57a113920c5dc66e17f6e56c1358d9b5ad576b5d92b46d442df263daca4fa9a56cc
-
Filesize
1KB
MD5f1d60b27e3d798e12efa60ec659a15b7
SHA1ff39d09936b77c8af8bef06ea3bf814eb36a8374
SHA2561a56f50c5bafe87b4ea6e3eec49f55984ca67359d4d83a71892e20e729f9ec77
SHA512e65b0f1a330ee467bcbac72b8b81d4992961f0cb6891b20ae40f669eb1e19f83e33be00e96f084ee8e9b9effc5844131c3ed412cf9ea0369508361b061056811