Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
26-11-2024 07:56
Static task
static1
Behavioral task
behavioral1
Sample
Quotation.js
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Quotation.js
Resource
win10v2004-20241007-en
General
-
Target
Quotation.js
-
Size
731KB
-
MD5
c3e39b8ea6a8813ffb4001cbd044a027
-
SHA1
36dc1ec5510e2531b23931b317e25ae2240df789
-
SHA256
1cef3a638243fd070d898fb3edabf7676d050246e736b73cdb9f23201d4f7858
-
SHA512
b61d5c9935f383334a33dc713bcf7c3ede9cda7f21766c9f06da3bd07dd874115c18fc6d58cbd3f20b99297c4a9017eb5b998db60f437a2d42fe1756f490e1f6
-
SSDEEP
6144:eQoo+DmkAh/CyDJuTg0lFPmx61HCLu+yHsWsLy+HiuNHW2Z5nJRU/pqFvVu77HEa:1+
Malware Config
Signatures
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
wscript.exedescription pid Process procid_target PID 1664 wrote to memory of 2352 1664 wscript.exe 30 PID 1664 wrote to memory of 2352 1664 wscript.exe 30 PID 1664 wrote to memory of 2352 1664 wscript.exe 30
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\Quotation.js1⤵
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\mabnhpoak.txt"2⤵PID:2352
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD52543beb989715570292d7263b60bab1a
SHA1ebb68838c9ce8f235349c2616bdd65f294b271ee
SHA2563ec814fcff2491c0863b5d5e5e26af3799bae70bc7fa4768cb5fbac74f0e0cab
SHA512c47b6f843bcc4906b03e011b0405b4bfb3bb65422e14fd6dd8bc7bc4975e055d5e93a3562c0031dcb065649d82b8e5ca30cf1279044bea572eb5c9ee30a264db