Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 07:30
Static task
static1
Behavioral task
behavioral1
Sample
a2686bc365897b29d0246666c89d2e9cc6002d8a604631c21cd8ffbc160d71e5.js
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a2686bc365897b29d0246666c89d2e9cc6002d8a604631c21cd8ffbc160d71e5.js
Resource
win10v2004-20241007-en
General
-
Target
a2686bc365897b29d0246666c89d2e9cc6002d8a604631c21cd8ffbc160d71e5.js
-
Size
15KB
-
MD5
d6f08791f0df06ddfe6e846d536a887f
-
SHA1
cde039518a07cb2ea65c4f2e984d19702cf84555
-
SHA256
a2686bc365897b29d0246666c89d2e9cc6002d8a604631c21cd8ffbc160d71e5
-
SHA512
66820099e493ebf7974d38cb7d78b1018cf7706ee12c278c1b86bec8bf6321b937cbfc91f35a5a82c5fb85564ce018e74ba00de4f6bb6eb9b2da71e0e0ecfc57
-
SSDEEP
384:XM49Wq5HlWaDIFieYws+9VgPxo+Kd9Mvv2iN05N5fXmfAvT3Q9FwhagFx2Vv6dUZ:XD9WsH0a8Finws+9VgPxo+Kd9MvvjN0u
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\a.txt
1JXSXybzEjjRJQDbVngTy7d8kEFAxmgmDN
http://xn--80adi0bdhdbmg.xn--p1ai/counter/?a=1JXSXybzEjjRJQDbVngTy7d8kEFAxmgmDN
http://jpnovo.ru/counter/?a=1JXSXybzEjjRJQDbVngTy7d8kEFAxmgmDN
http://lacampagnetropicana.com/counter/?a=1JXSXybzEjjRJQDbVngTy7d8kEFAxmgmDN
http://cestasgabrasil.com.br/counter/?a=1JXSXybzEjjRJQDbVngTy7d8kEFAxmgmDN
http://radostdetym.ru/counter/?a=1JXSXybzEjjRJQDbVngTy7d8kEFAxmgmDN
Signatures
-
Blocklisted process makes network request 6 IoCs
Processes:
wscript.exeflow pid process 7 2388 wscript.exe 12 2388 wscript.exe 13 2388 wscript.exe 14 2388 wscript.exe 15 2388 wscript.exe 16 2388 wscript.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\Crypted = "C:\\Users\\Admin\\AppData\\Local\\Temp\\a.txt" reg.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 7 IoCs
Processes:
reg.exereg.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Crypted\shell\open\command\ = "notepad.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\a.txt\"" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.crypted reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.crypted\ = "Crypted" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Crypted\shell\open\command reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Crypted reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Crypted\shell reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Crypted\shell\open reg.exe -
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
notepad.exepid process 2844 notepad.exe -
Suspicious use of WriteProcessMemory 42 IoCs
Processes:
wscript.execmd.execmd.execmd.execmd.exedescription pid process target process PID 2388 wrote to memory of 2924 2388 wscript.exe cmd.exe PID 2388 wrote to memory of 2924 2388 wscript.exe cmd.exe PID 2388 wrote to memory of 2924 2388 wscript.exe cmd.exe PID 2388 wrote to memory of 2608 2388 wscript.exe cmd.exe PID 2388 wrote to memory of 2608 2388 wscript.exe cmd.exe PID 2388 wrote to memory of 2608 2388 wscript.exe cmd.exe PID 2388 wrote to memory of 2620 2388 wscript.exe cmd.exe PID 2388 wrote to memory of 2620 2388 wscript.exe cmd.exe PID 2388 wrote to memory of 2620 2388 wscript.exe cmd.exe PID 2388 wrote to memory of 2720 2388 wscript.exe cmd.exe PID 2388 wrote to memory of 2720 2388 wscript.exe cmd.exe PID 2388 wrote to memory of 2720 2388 wscript.exe cmd.exe PID 2388 wrote to memory of 2004 2388 wscript.exe cmd.exe PID 2388 wrote to memory of 2004 2388 wscript.exe cmd.exe PID 2388 wrote to memory of 2004 2388 wscript.exe cmd.exe PID 2388 wrote to memory of 2352 2388 wscript.exe cmd.exe PID 2388 wrote to memory of 2352 2388 wscript.exe cmd.exe PID 2388 wrote to memory of 2352 2388 wscript.exe cmd.exe PID 2608 wrote to memory of 1888 2608 cmd.exe reg.exe PID 2608 wrote to memory of 1888 2608 cmd.exe reg.exe PID 2608 wrote to memory of 1888 2608 cmd.exe reg.exe PID 2924 wrote to memory of 1412 2924 cmd.exe reg.exe PID 2924 wrote to memory of 1412 2924 cmd.exe reg.exe PID 2924 wrote to memory of 1412 2924 cmd.exe reg.exe PID 2620 wrote to memory of 2692 2620 cmd.exe reg.exe PID 2620 wrote to memory of 2692 2620 cmd.exe reg.exe PID 2620 wrote to memory of 2692 2620 cmd.exe reg.exe PID 2388 wrote to memory of 1636 2388 wscript.exe cmd.exe PID 2388 wrote to memory of 1636 2388 wscript.exe cmd.exe PID 2388 wrote to memory of 1636 2388 wscript.exe cmd.exe PID 2388 wrote to memory of 388 2388 wscript.exe cmd.exe PID 2388 wrote to memory of 388 2388 wscript.exe cmd.exe PID 2388 wrote to memory of 388 2388 wscript.exe cmd.exe PID 2388 wrote to memory of 2672 2388 wscript.exe cmd.exe PID 2388 wrote to memory of 2672 2388 wscript.exe cmd.exe PID 2388 wrote to memory of 2672 2388 wscript.exe cmd.exe PID 2388 wrote to memory of 1056 2388 wscript.exe cmd.exe PID 2388 wrote to memory of 1056 2388 wscript.exe cmd.exe PID 2388 wrote to memory of 1056 2388 wscript.exe cmd.exe PID 1636 wrote to memory of 2844 1636 cmd.exe notepad.exe PID 1636 wrote to memory of 2844 1636 cmd.exe notepad.exe PID 1636 wrote to memory of 2844 1636 cmd.exe notepad.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\a2686bc365897b29d0246666c89d2e9cc6002d8a604631c21cd8ffbc160d71e5.js1⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Crypted" /t REG_SZ /F /D "C:\Users\Admin\AppData\Local\Temp\a.txt"2⤵
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\system32\reg.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Crypted" /t REG_SZ /F /D "C:\Users\Admin\AppData\Local\Temp\a.txt"3⤵
- Adds Run key to start application
PID:1412
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c REG ADD "HKCR\.crypted" /ve /t REG_SZ /F /D "Crypted"2⤵
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\system32\reg.exeREG ADD "HKCR\.crypted" /ve /t REG_SZ /F /D "Crypted"3⤵
- Modifies registry class
PID:1888
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c REG ADD "HKCR\Crypted\shell\open\command" /ve /t REG_SZ /F /D "notepad.exe \"C:\Users\Admin\AppData\Local\Temp\a.txt\""2⤵
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\system32\reg.exeREG ADD "HKCR\Crypted\shell\open\command" /ve /t REG_SZ /F /D "notepad.exe \"C:\Users\Admin\AppData\Local\Temp\a.txt\""3⤵
- Modifies registry class
PID:2692
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c copy /y "C:\Users\Admin\AppData\Local\Temp\a.txt" "C:\Users\Admin\AppData\Roaming\Desktop\DECRYPT.txt"2⤵PID:2720
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c copy /y "C:\Users\Admin\AppData\Local\Temp\a.txt" "C:\Users\Admin\Desktop\DECRYPT.txt"2⤵PID:2004
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\a.exe "C:\Users\Admin\AppData\Local\Temp\a.php"2⤵PID:2352
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c notepad.exe "C:\Users\Admin\AppData\Local\Temp\a.txt"2⤵
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\system32\notepad.exenotepad.exe "C:\Users\Admin\AppData\Local\Temp\a.txt"3⤵
- Opens file in notepad (likely ransom note)
PID:2844
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL "C:\Users\Admin\AppData\Local\Temp\a.php"2⤵PID:388
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL "C:\Users\Admin\AppData\Local\Temp\a.exe"2⤵PID:2672
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL "C:\Users\Admin\AppData\Local\Temp\php4ts.dll"2⤵PID:1056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD5bc3ae13abec7937f50b3f3eea1e2fa04
SHA1f271d2ce7b997473bc2b00d624282d44a3bdbc13
SHA256d5a436a5ab186a66e4b4b28482a54eb9dd8d32e62f9ce7450e3fa52520ca8282
SHA5120d23651c455ec581bd42667fd360f98467732ac41d5c623c1357bdaf2d1f856e7100605388f188f4851c3acfbad65abefd0144655d2606f117cb76b3ebb53544
-
Filesize
1KB
MD58aad373d6f4e7a096f53032a69d7f401
SHA142e62dc1cb4dda1d618f2c7384fdc8946b62a135
SHA256f14cabebe355a7121ac295299d1b4e79183ac2370aa6a983e1cd65016607c94f
SHA51279989ad8d1a9eca59bbd2b79bab753a6fa6173acca92f100ec491fd9372d94b28f9d789fc116968923203782a22be081ef87d1f5639b5828dc1d4b31b5bcaa37
-
Filesize
3KB
MD5cc666088a917dd7f5da8b6689069aec0
SHA1f688de634ccd20939a522391abb5049483e726bd
SHA256332d102987273318f13e7fc89a043613c6dd5dd7eb7d21033a2ab73dd438a405
SHA51277a15aebeb10d355e3723fdebd2ea59a09a60d54f09ab9a6f06c52dbfa3bea0965ff49b7a1c2e6f4ff94f3fe903e6301188de2f80801a8a978c8c09b3356c8dc