Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
18-02-2025 16:39
Static task
static1
Behavioral task
behavioral1
Sample
Order_Details.js
Resource
win7-20241010-en
General
-
Target
Order_Details.js
-
Size
207KB
-
MD5
eeaadaf8c5d945f8a0f0c0fa01c4dfed
-
SHA1
ffcb938606180bb21a989cb3f2694805c6de0892
-
SHA256
14def6c04f10749ef9f9efce3767d8776a4c40327541a85efad4706a6b496ad1
-
SHA512
37e83d74c320f8a5d04cf070abeb6f90b24ddf2dece4b5894f8410bb9dfe1b7bc731ef70f501a2cee881295a45ea75522f9b38b2a81c8dbdaad16b6d66d15a3c
-
SSDEEP
6144:eQ+BEXXTRePXM9G29OETHy4zhaV8LAlNnIGURb34c:1cblSOEO4zhWLsn
Malware Config
Signatures
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1084 wrote to memory of 740 1084 wscript.exe 30 PID 1084 wrote to memory of 740 1084 wscript.exe 30 PID 1084 wrote to memory of 740 1084 wscript.exe 30
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\Order_Details.js1⤵
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\imxfzjptj.txt"2⤵PID:740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD52543beb989715570292d7263b60bab1a
SHA1ebb68838c9ce8f235349c2616bdd65f294b271ee
SHA2563ec814fcff2491c0863b5d5e5e26af3799bae70bc7fa4768cb5fbac74f0e0cab
SHA512c47b6f843bcc4906b03e011b0405b4bfb3bb65422e14fd6dd8bc7bc4975e055d5e93a3562c0031dcb065649d82b8e5ca30cf1279044bea572eb5c9ee30a264db