Analysis

  • max time kernel
    16s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-11-2024 03:36

General

  • Target

    downloader.js

  • Size

    8KB

  • MD5

    2fabecc77b10b39ff03f221f39f50c6c

  • SHA1

    e66ab4015c360a0f0866ea840dbeb2ef4953c86d

  • SHA256

    f6e2c1b42ce68165fd2cd8580daf47d594c4960fc8fb5cdbf1ec210e3ffae87f

  • SHA512

    9c8bcaee59eaa6d9738caf9a61214e098438e5ecc352e8faaa7972625c3bce3f00eece4bd7b43587b09a5ef66c93778b42d0b39a7ef46aeca5d3f7da2a43384a

  • SSDEEP

    192:E4/wMMuUYDKe5enZr2CU0eC+To2fOO0spxetRut64pB6BS:bMufcnZr2CU0etTaO7GtRut6UMQ

Malware Config

Signatures

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\downloader.js
    1⤵
    • Blocklisted process makes network request
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1920
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\360390_tree.cmd" "
      2⤵
        PID:1168

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\360390_tree.cmd

      Filesize

      15KB

      MD5

      d96f59d97099a6248989e828d766dd5b

      SHA1

      9322d296171970ce8a280a4c562f41b5f3689de0

      SHA256

      e534769d416412d6ea8e91faf108bd8f52838e854145eab052483c37b4add1e3

      SHA512

      562c52a4dab31d9fc8983823561d181ddd0d0999baf3cbe8841afd3919ae020df573f41bd58fe6ecd090d47a1a1d2bad6abd68955e329cd541974c12d4ceca8c