Analysis

  • max time kernel
    71s
  • max time network
    157s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    22-11-2024 03:27

General

  • Target

    downloader.js

  • Size

    8KB

  • MD5

    2fabecc77b10b39ff03f221f39f50c6c

  • SHA1

    e66ab4015c360a0f0866ea840dbeb2ef4953c86d

  • SHA256

    f6e2c1b42ce68165fd2cd8580daf47d594c4960fc8fb5cdbf1ec210e3ffae87f

  • SHA512

    9c8bcaee59eaa6d9738caf9a61214e098438e5ecc352e8faaa7972625c3bce3f00eece4bd7b43587b09a5ef66c93778b42d0b39a7ef46aeca5d3f7da2a43384a

  • SSDEEP

    192:E4/wMMuUYDKe5enZr2CU0eC+To2fOO0spxetRut64pB6BS:bMufcnZr2CU0etTaO7GtRut6UMQ

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\360390_readme.txt

Ransom Note
ATTENTION: All your documents, photos, databases and other important personal files were encrypted using strong RSA-1024 algorithm with a unique key. To restore your files you have to pay 0.5 BTC (bitcoins). To do this: 1. Create Bitcoin wallet here: https://blockchain.info/wallet/new 2. Buy 0.5 BTC with cash, using search here: https://localbitcoins.com/buy_bitcoins 3. Send 0.5 BTC to this Bitcoin address: oJHR97yvh97wrjvwlkrcnqrp79w9rvqnrvj 4. Send any e-mail to: [email protected] After that you will recieve e-mail with detailed instructions how to restore your files. Remember: nobody can help you except us. It is useless to reinstall Windows, rename files, etc. Your files will be decrypted as quick as you make payment.

Signatures

  • Blocklisted process makes network request 4 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\downloader.js
    1⤵
    • Blocklisted process makes network request
    • Suspicious use of WriteProcessMemory
    PID:1968
    • C:\Windows\system32\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\360390_tree.cmd" "
      2⤵
        PID:2812
        • C:\Windows\system32\notepad.exe
          notepad.exe C:\Users\Admin\AppData\Local\Temp\360390_readme.txt
          3⤵
          • Opens file in notepad (likely ransom note)
          PID:752
        • C:\Windows\system32\reg.exe
          REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "WinHelp" /t REG_SZ /F /D "C:\Users\Admin\AppData\Local\Temp\360390_readme.txt"
          3⤵
            PID:1672

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\360390_readme.txt

        Filesize

        772B

        MD5

        f6a2bb17bf99a4dab08f75504bf270b3

        SHA1

        d42b9acaa08e19e1708e0e00a7961b8dd3219102

        SHA256

        34d5153eb38ee664fc03fcb7de7a75a76c1162fa83110d34e6b64c29424ed6ed

        SHA512

        037a713b6e8580adf6773992b29b75dcae8d0284dee228deddb41149d89aafefc9d8bf4374d8437d57f6a26afede42accb629988b5cd234430f53f5df2da0a96

      • C:\Users\Admin\AppData\Local\Temp\360390_tree.cmd

        Filesize

        15KB

        MD5

        d96f59d97099a6248989e828d766dd5b

        SHA1

        9322d296171970ce8a280a4c562f41b5f3689de0

        SHA256

        e534769d416412d6ea8e91faf108bd8f52838e854145eab052483c37b4add1e3

        SHA512

        562c52a4dab31d9fc8983823561d181ddd0d0999baf3cbe8841afd3919ae020df573f41bd58fe6ecd090d47a1a1d2bad6abd68955e329cd541974c12d4ceca8c