Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    19-06-2024 15:16

General

  • Target

    201483f282a58582d9a11ac56491bd74bd25caa0635987297d6cc985f4078bea.js

  • Size

    415KB

  • MD5

    b7bef63b1d36f38f696469ace03c61c4

  • SHA1

    6354ac040b6fda031ebf37e90eae9eb68b97bd94

  • SHA256

    201483f282a58582d9a11ac56491bd74bd25caa0635987297d6cc985f4078bea

  • SHA512

    a94833b8df108d34f39c87377ab0f46a81774056e40e45f34e504c25ed7e99e647a4622b30be7096e526e1a359a69c99261f69805cc7e956d8bc4f865a3ffd45

  • SSDEEP

    6144:XQ6gcED4sXas+CryilhnTUX5jcniqlSu+yxq3RKN24mR1V3JMV9DLC7:g688sXasSsUXiXEwgLcLC7

Score
3/10

Malware Config

Signatures

  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\201483f282a58582d9a11ac56491bd74bd25caa0635987297d6cc985f4078bea.js
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1476
    • C:\Program Files\Java\jre7\bin\javaw.exe
      "C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\evoykpqm.txt"
      2⤵
        PID:2592

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Execution

    Command and Scripting Interpreter

    1
    T1059

    JavaScript

    1
    T1059.007

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\evoykpqm.txt
      Filesize

      202KB

      MD5

      4c6cadc27c84e3c1cc0e0a02eedf70b4

      SHA1

      6744f248d56276d11eb2a4b72e0bf83b56088510

      SHA256

      ea567fa68562fae02b4ca07fb22a4aab17a2970b2083c4fe65a5bad3a9324dd4

      SHA512

      f14f1ef647b573fa016b5fb84130a18018814a00c31ce9f48dc2e701cbd693ca1655f2d76905f3cd89cdf84927708c5abefc58561991701e8028da0f927a6be3

    • memory/2592-4-0x0000000002190000-0x0000000002400000-memory.dmp
      Filesize

      2.4MB

    • memory/2592-12-0x0000000000120000-0x0000000000121000-memory.dmp
      Filesize

      4KB

    • memory/2592-19-0x0000000000120000-0x0000000000121000-memory.dmp
      Filesize

      4KB

    • memory/2592-29-0x0000000000120000-0x0000000000121000-memory.dmp
      Filesize

      4KB

    • memory/2592-41-0x0000000000120000-0x0000000000121000-memory.dmp
      Filesize

      4KB

    • memory/2592-47-0x0000000000120000-0x0000000000121000-memory.dmp
      Filesize

      4KB

    • memory/2592-96-0x0000000000120000-0x0000000000121000-memory.dmp
      Filesize

      4KB

    • memory/2592-258-0x0000000002190000-0x0000000002400000-memory.dmp
      Filesize

      2.4MB