Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
05-02-2025 16:51
Static task
static1
Behavioral task
behavioral1
Sample
QUOTATION.js
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
QUOTATION.js
Resource
win10v2004-20250129-en
General
-
Target
QUOTATION.js
-
Size
202KB
-
MD5
c3399d5962cf0c35d267fa5157e1a1e9
-
SHA1
0fe5746c7e7ba86f5ce85f07e1cd2b2d391f17ac
-
SHA256
dc628151dd00039d1f96e11cfffcca93ca411132073a71b5bf9bee3d5368a56c
-
SHA512
3376bc35195a7f89035ef55f18cd5dfdbc7185cd402ec8884584ac7159523af20267a3aa3fbd809496c2a06d44b6eaf2f1f5b92c63033b2db04e9bd111616710
-
SSDEEP
3072:eQ/b8kU1KiwwFAaXoq271qPihljhmS/NeuTP9YTeGiNgphTmVWzai//Hocnih82:eQ/JU1KfSiUMjhmSlBT1YJiNg/vpHtQ
Malware Config
Signatures
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3064 wrote to memory of 2760 3064 wscript.exe 30 PID 3064 wrote to memory of 2760 3064 wscript.exe 30 PID 3064 wrote to memory of 2760 3064 wscript.exe 30
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\QUOTATION.js1⤵
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\bbdbkdyf.txt"2⤵PID:2760
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD52543beb989715570292d7263b60bab1a
SHA1ebb68838c9ce8f235349c2616bdd65f294b271ee
SHA2563ec814fcff2491c0863b5d5e5e26af3799bae70bc7fa4768cb5fbac74f0e0cab
SHA512c47b6f843bcc4906b03e011b0405b4bfb3bb65422e14fd6dd8bc7bc4975e055d5e93a3562c0031dcb065649d82b8e5ca30cf1279044bea572eb5c9ee30a264db