Analysis
-
max time kernel
44s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
29-11-2022 05:12
Static task
static1
Behavioral task
behavioral1
Sample
AS.js
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
AS.js
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
fix/calipers.js
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
fix/calipers.js
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
fix/soapy.ps1
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
fix/soapy.ps1
Resource
win10v2004-20221111-en
General
-
Target
fix/calipers.js
-
Size
130B
-
MD5
b4f55e16ea2a695512c151c9c994733d
-
SHA1
211c14ea90f9d5d6ff033257a795b13ef5a05be0
-
SHA256
bf97f591e6d9ec0dbb91f5c937c74f53c3307b22095b2e1908540590b114932f
-
SHA512
9adf71c261472e8f9a99a22d742172c5cc6161c83caca70a66847eb48e7642c1e33db735202dc6d124b803c3c2a187155a468457a2d0242578093e4c11df26d8
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 668 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 668 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
wscript.exedescription pid process target process PID 1200 wrote to memory of 668 1200 wscript.exe powershell.exe PID 1200 wrote to memory of 668 1200 wscript.exe powershell.exe PID 1200 wrote to memory of 668 1200 wscript.exe powershell.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\fix\calipers.js1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass fix\soapy.ps12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/668-55-0x0000000000000000-mapping.dmp
-
memory/668-57-0x000007FEF37E0000-0x000007FEF4203000-memory.dmpFilesize
10.1MB
-
memory/668-59-0x0000000002664000-0x0000000002667000-memory.dmpFilesize
12KB
-
memory/668-58-0x000007FEF2C80000-0x000007FEF37DD000-memory.dmpFilesize
11.4MB
-
memory/668-60-0x0000000002664000-0x0000000002667000-memory.dmpFilesize
12KB
-
memory/668-61-0x000000000266B000-0x000000000268A000-memory.dmpFilesize
124KB
-
memory/1200-54-0x000007FEFC001000-0x000007FEFC003000-memory.dmpFilesize
8KB