Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 07:27
Static task
static1
Behavioral task
behavioral1
Sample
a2686bc365897b29d0246666c89d2e9cc6002d8a604631c21cd8ffbc160d71e5.js
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a2686bc365897b29d0246666c89d2e9cc6002d8a604631c21cd8ffbc160d71e5.js
Resource
win10v2004-20241007-en
General
-
Target
a2686bc365897b29d0246666c89d2e9cc6002d8a604631c21cd8ffbc160d71e5.js
-
Size
15KB
-
MD5
d6f08791f0df06ddfe6e846d536a887f
-
SHA1
cde039518a07cb2ea65c4f2e984d19702cf84555
-
SHA256
a2686bc365897b29d0246666c89d2e9cc6002d8a604631c21cd8ffbc160d71e5
-
SHA512
66820099e493ebf7974d38cb7d78b1018cf7706ee12c278c1b86bec8bf6321b937cbfc91f35a5a82c5fb85564ce018e74ba00de4f6bb6eb9b2da71e0e0ecfc57
-
SSDEEP
384:XM49Wq5HlWaDIFieYws+9VgPxo+Kd9Mvv2iN05N5fXmfAvT3Q9FwhagFx2Vv6dUZ:XD9WsH0a8Finws+9VgPxo+Kd9MvvjN0u
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\a.txt
1JXSXybzEjjRJQDbVngTy7d8kEFAxmgmDN
http://xn--80adi0bdhdbmg.xn--p1ai/counter/?a=1JXSXybzEjjRJQDbVngTy7d8kEFAxmgmDN
http://jpnovo.ru/counter/?a=1JXSXybzEjjRJQDbVngTy7d8kEFAxmgmDN
http://lacampagnetropicana.com/counter/?a=1JXSXybzEjjRJQDbVngTy7d8kEFAxmgmDN
http://cestasgabrasil.com.br/counter/?a=1JXSXybzEjjRJQDbVngTy7d8kEFAxmgmDN
http://radostdetym.ru/counter/?a=1JXSXybzEjjRJQDbVngTy7d8kEFAxmgmDN
Signatures
-
Blocklisted process makes network request 6 IoCs
Processes:
wscript.exeflow pid process 7 2080 wscript.exe 12 2080 wscript.exe 13 2080 wscript.exe 14 2080 wscript.exe 15 2080 wscript.exe 16 2080 wscript.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\Crypted = "C:\\Users\\Admin\\AppData\\Local\\Temp\\a.txt" reg.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 7 IoCs
Processes:
reg.exereg.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Crypted\shell\open\command reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Crypted reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Crypted\shell reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Crypted\shell\open reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Crypted\shell\open\command\ = "notepad.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\a.txt\"" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.crypted reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.crypted\ = "Crypted" reg.exe -
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
notepad.exepid process 2856 notepad.exe -
Suspicious use of WriteProcessMemory 42 IoCs
Processes:
wscript.execmd.execmd.execmd.execmd.exedescription pid process target process PID 2080 wrote to memory of 2644 2080 wscript.exe cmd.exe PID 2080 wrote to memory of 2644 2080 wscript.exe cmd.exe PID 2080 wrote to memory of 2644 2080 wscript.exe cmd.exe PID 2080 wrote to memory of 2640 2080 wscript.exe cmd.exe PID 2080 wrote to memory of 2640 2080 wscript.exe cmd.exe PID 2080 wrote to memory of 2640 2080 wscript.exe cmd.exe PID 2080 wrote to memory of 768 2080 wscript.exe cmd.exe PID 2080 wrote to memory of 768 2080 wscript.exe cmd.exe PID 2080 wrote to memory of 768 2080 wscript.exe cmd.exe PID 2080 wrote to memory of 2616 2080 wscript.exe cmd.exe PID 2080 wrote to memory of 2616 2080 wscript.exe cmd.exe PID 2080 wrote to memory of 2616 2080 wscript.exe cmd.exe PID 2080 wrote to memory of 2660 2080 wscript.exe cmd.exe PID 2080 wrote to memory of 2660 2080 wscript.exe cmd.exe PID 2080 wrote to memory of 2660 2080 wscript.exe cmd.exe PID 768 wrote to memory of 2312 768 cmd.exe reg.exe PID 768 wrote to memory of 2312 768 cmd.exe reg.exe PID 768 wrote to memory of 2312 768 cmd.exe reg.exe PID 2080 wrote to memory of 2180 2080 wscript.exe cmd.exe PID 2080 wrote to memory of 2180 2080 wscript.exe cmd.exe PID 2080 wrote to memory of 2180 2080 wscript.exe cmd.exe PID 2640 wrote to memory of 1744 2640 cmd.exe reg.exe PID 2640 wrote to memory of 1744 2640 cmd.exe reg.exe PID 2640 wrote to memory of 1744 2640 cmd.exe reg.exe PID 2644 wrote to memory of 2344 2644 cmd.exe reg.exe PID 2644 wrote to memory of 2344 2644 cmd.exe reg.exe PID 2644 wrote to memory of 2344 2644 cmd.exe reg.exe PID 2080 wrote to memory of 1928 2080 wscript.exe cmd.exe PID 2080 wrote to memory of 1928 2080 wscript.exe cmd.exe PID 2080 wrote to memory of 1928 2080 wscript.exe cmd.exe PID 2080 wrote to memory of 1400 2080 wscript.exe cmd.exe PID 2080 wrote to memory of 1400 2080 wscript.exe cmd.exe PID 2080 wrote to memory of 1400 2080 wscript.exe cmd.exe PID 2080 wrote to memory of 1716 2080 wscript.exe cmd.exe PID 2080 wrote to memory of 1716 2080 wscript.exe cmd.exe PID 2080 wrote to memory of 1716 2080 wscript.exe cmd.exe PID 2080 wrote to memory of 2032 2080 wscript.exe cmd.exe PID 2080 wrote to memory of 2032 2080 wscript.exe cmd.exe PID 2080 wrote to memory of 2032 2080 wscript.exe cmd.exe PID 1928 wrote to memory of 2856 1928 cmd.exe notepad.exe PID 1928 wrote to memory of 2856 1928 cmd.exe notepad.exe PID 1928 wrote to memory of 2856 1928 cmd.exe notepad.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\a2686bc365897b29d0246666c89d2e9cc6002d8a604631c21cd8ffbc160d71e5.js1⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Crypted" /t REG_SZ /F /D "C:\Users\Admin\AppData\Local\Temp\a.txt"2⤵
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\system32\reg.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Crypted" /t REG_SZ /F /D "C:\Users\Admin\AppData\Local\Temp\a.txt"3⤵
- Adds Run key to start application
PID:2344
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c REG ADD "HKCR\.crypted" /ve /t REG_SZ /F /D "Crypted"2⤵
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\system32\reg.exeREG ADD "HKCR\.crypted" /ve /t REG_SZ /F /D "Crypted"3⤵
- Modifies registry class
PID:1744
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c REG ADD "HKCR\Crypted\shell\open\command" /ve /t REG_SZ /F /D "notepad.exe \"C:\Users\Admin\AppData\Local\Temp\a.txt\""2⤵
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Windows\system32\reg.exeREG ADD "HKCR\Crypted\shell\open\command" /ve /t REG_SZ /F /D "notepad.exe \"C:\Users\Admin\AppData\Local\Temp\a.txt\""3⤵
- Modifies registry class
PID:2312
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c copy /y "C:\Users\Admin\AppData\Local\Temp\a.txt" "C:\Users\Admin\AppData\Roaming\Desktop\DECRYPT.txt"2⤵PID:2616
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c copy /y "C:\Users\Admin\AppData\Local\Temp\a.txt" "C:\Users\Admin\Desktop\DECRYPT.txt"2⤵PID:2660
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\a.exe "C:\Users\Admin\AppData\Local\Temp\a.php"2⤵PID:2180
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c notepad.exe "C:\Users\Admin\AppData\Local\Temp\a.txt"2⤵
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\system32\notepad.exenotepad.exe "C:\Users\Admin\AppData\Local\Temp\a.txt"3⤵
- Opens file in notepad (likely ransom note)
PID:2856
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL "C:\Users\Admin\AppData\Local\Temp\a.php"2⤵PID:1400
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL "C:\Users\Admin\AppData\Local\Temp\a.exe"2⤵PID:1716
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL "C:\Users\Admin\AppData\Local\Temp\php4ts.dll"2⤵PID:2032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD5bc3ae13abec7937f50b3f3eea1e2fa04
SHA1f271d2ce7b997473bc2b00d624282d44a3bdbc13
SHA256d5a436a5ab186a66e4b4b28482a54eb9dd8d32e62f9ce7450e3fa52520ca8282
SHA5120d23651c455ec581bd42667fd360f98467732ac41d5c623c1357bdaf2d1f856e7100605388f188f4851c3acfbad65abefd0144655d2606f117cb76b3ebb53544
-
Filesize
1KB
MD58aad373d6f4e7a096f53032a69d7f401
SHA142e62dc1cb4dda1d618f2c7384fdc8946b62a135
SHA256f14cabebe355a7121ac295299d1b4e79183ac2370aa6a983e1cd65016607c94f
SHA51279989ad8d1a9eca59bbd2b79bab753a6fa6173acca92f100ec491fd9372d94b28f9d789fc116968923203782a22be081ef87d1f5639b5828dc1d4b31b5bcaa37
-
Filesize
3KB
MD5cc666088a917dd7f5da8b6689069aec0
SHA1f688de634ccd20939a522391abb5049483e726bd
SHA256332d102987273318f13e7fc89a043613c6dd5dd7eb7d21033a2ab73dd438a405
SHA51277a15aebeb10d355e3723fdebd2ea59a09a60d54f09ab9a6f06c52dbfa3bea0965ff49b7a1c2e6f4ff94f3fe903e6301188de2f80801a8a978c8c09b3356c8dc