Resubmissions
28-11-2022 19:10
221128-xvd6ashh56 1028-11-2022 19:09
221128-xtsmashh23 1028-11-2022 15:04
221128-sf2wlacc29 10Analysis
-
max time kernel
5s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
28-11-2022 15:04
Static task
static1
Behavioral task
behavioral1
Sample
AS.js
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
AS.js
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
fix/adjutant.js
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
fix/adjutant.js
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
fix/hypersensitiveness.ps1
Resource
win7-20221111-en
Behavioral task
behavioral6
Sample
fix/hypersensitiveness.ps1
Resource
win10v2004-20221111-en
General
-
Target
fix/adjutant.js
-
Size
143B
-
MD5
7249f0cf1e44e8e7a3642e2bbb0c0b1f
-
SHA1
49d2212ddc7444087928b7a4a2e2adb72febca85
-
SHA256
02049dd1dce83d87edaa23656c4327af83be55f67f793afac7203ac4c12a76e9
-
SHA512
b5b72aedc217c69ec6385f63575b8e0b77e35334ff673cf8a107b64f517bf762e8464da5c749c160576c26fa6b7198e62266dfd40d497daab3d535b7cee19296
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 668 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 668 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
wscript.exedescription pid process target process PID 948 wrote to memory of 668 948 wscript.exe powershell.exe PID 948 wrote to memory of 668 948 wscript.exe powershell.exe PID 948 wrote to memory of 668 948 wscript.exe powershell.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\fix\adjutant.js1⤵
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass fix\hypersensitiveness.ps12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:668
-