Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-02-2025 03:43
Static task
static1
Behavioral task
behavioral1
Sample
967bc4076a447dfd7f1bbd07c25ed555f6e831cc5ee6111a61563863b58e27d0.js
Resource
win7-20240903-en
General
-
Target
967bc4076a447dfd7f1bbd07c25ed555f6e831cc5ee6111a61563863b58e27d0.js
-
Size
199KB
-
MD5
d730a8e5aa754e3ead0177d8e382077b
-
SHA1
f49626e9fc39f17f096d601b65c0e231c42f4cf5
-
SHA256
967bc4076a447dfd7f1bbd07c25ed555f6e831cc5ee6111a61563863b58e27d0
-
SHA512
cc913d5b0b9e30aa9ed4a25d3a429c19cf36d0fc1dda0342915098cd39cb1e06a05fd408a7165029c510ff500cea6f7befc4baf6e1e44d2ed2048d9786f4df68
-
SSDEEP
3072:eQa4mxi9huKa5yaDGx6FCIDl4xMSzGOn+isW/3B6HVHPsZw4:eQa4mx2M5IxsjBivGOn+iRoi
Malware Config
Signatures
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1924 wrote to memory of 2408 1924 wscript.exe 30 PID 1924 wrote to memory of 2408 1924 wscript.exe 30 PID 1924 wrote to memory of 2408 1924 wscript.exe 30
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\967bc4076a447dfd7f1bbd07c25ed555f6e831cc5ee6111a61563863b58e27d0.js1⤵
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\jsnxuksgub.txt"2⤵PID:2408
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD52543beb989715570292d7263b60bab1a
SHA1ebb68838c9ce8f235349c2616bdd65f294b271ee
SHA2563ec814fcff2491c0863b5d5e5e26af3799bae70bc7fa4768cb5fbac74f0e0cab
SHA512c47b6f843bcc4906b03e011b0405b4bfb3bb65422e14fd6dd8bc7bc4975e055d5e93a3562c0031dcb065649d82b8e5ca30cf1279044bea572eb5c9ee30a264db