Analysis
-
max time kernel
226s -
max time network
334s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
29-11-2022 05:15
Static task
static1
Behavioral task
behavioral1
Sample
AS.js
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
AS.js
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
fix/detect.ps1
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
fix/detect.ps1
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
fix/promoters.js
Resource
win7-20221111-en
Behavioral task
behavioral6
Sample
fix/promoters.js
Resource
win10v2004-20220812-en
General
-
Target
fix/promoters.js
-
Size
131B
-
MD5
6fe9519aa99f2b3c90b196bf2f027e9f
-
SHA1
5f6005844a17a18381860a9096c7318661e700f3
-
SHA256
1511e81e0a5262e28fcea3228980cf3ab7dee93ca5e151c0b3ad1d4a2c64226d
-
SHA512
e3fd04269ba26072fa586a8d4c453941d8d3af7186c070f2b13483ac473571e0d9489eb5ae9dbc6a508f0f53900329ca0b5bdf9454a6a17ce6f0a95c9ffa6924
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 1868 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 1868 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
wscript.exedescription pid process target process PID 540 wrote to memory of 1868 540 wscript.exe powershell.exe PID 540 wrote to memory of 1868 540 wscript.exe powershell.exe PID 540 wrote to memory of 1868 540 wscript.exe powershell.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\fix\promoters.js1⤵
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass fix\detect.ps12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1868
-