Analysis
-
max time kernel
14s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
25-11-2024 09:39
Static task
static1
Behavioral task
behavioral1
Sample
DOC934798848.js
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
DOC934798848.js
Resource
win10v2004-20241007-en
General
-
Target
DOC934798848.js
-
Size
238KB
-
MD5
208ac4eb6c75aced85071562b1bc079d
-
SHA1
0a3bb6f310317d31bad26a0076c5e7313699739b
-
SHA256
427e4dcb36206392d10846d4aa4e37ec0c724d2b5c26c662b3670b120bdf84c3
-
SHA512
1f2d13791bbc1e58f42eee63e6e5708b333d476d0f3ea39c185a99a7f11079477c80ddbef4304a27a4b62114579b5443d0d698a689929ccea3e0b27bee3d9b13
-
SSDEEP
6144:eQrh+XeVWsUDMmQPiXmvnuKFESB51tsr3wtNX5ihm:19xWsUDaESBBsr3uXl
Malware Config
Signatures
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
wscript.exedescription pid process target process PID 2388 wrote to memory of 2468 2388 wscript.exe javaw.exe PID 2388 wrote to memory of 2468 2388 wscript.exe javaw.exe PID 2388 wrote to memory of 2468 2388 wscript.exe javaw.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\DOC934798848.js1⤵
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\xviookt.txt"2⤵PID:2468
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
109KB
MD57a5c4c8206af87ef76588eaa1fab0060
SHA130a4b99d4a65cf9bd7997fe2365bf677b7849a54
SHA256e70bb96d50cb6319c4da5972c986dd4732ab6c4c78af96687454ffdb95b56b4b
SHA512352b5dc4081928a713ea79c761752c0e2ef5f4cdfc5e2426f9e2643ee0a490415d27d29f92373ba8e463b773f3e2b0e5236336673ce0b27f68bed3b3c3a3a7fe