Analysis
-
max time kernel
37s -
max time network
42s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29-11-2022 11:52
Static task
static1
Behavioral task
behavioral1
Sample
AS.js
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
AS.js
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
fix/cowl.ps1
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
fix/cowl.ps1
Resource
win10v2004-20220901-en
Behavioral task
behavioral5
Sample
fix/fasteners.js
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
fix/fasteners.js
Resource
win10v2004-20221111-en
General
-
Target
fix/fasteners.js
-
Size
129B
-
MD5
815f217a8b2b8d7eef95542d11c1fef0
-
SHA1
0c84e7f4bccfd12b5fc2c24d57369c7c50a73173
-
SHA256
198afd6cd021f7b4a77102147ec9074af39bad496cc8ef099ad799ad8483b9a1
-
SHA512
a87010168f7433bacc91aeb49f8b53487da7412562808323b4bc5ff502a6174761585bce6da48b9a038362883188c25a3c05e6aca8701374b6f26c177137c425
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 936 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 936 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
wscript.exedescription pid process target process PID 944 wrote to memory of 936 944 wscript.exe powershell.exe PID 944 wrote to memory of 936 944 wscript.exe powershell.exe PID 944 wrote to memory of 936 944 wscript.exe powershell.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\fix\fasteners.js1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass fix\cowl.ps12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/936-55-0x0000000000000000-mapping.dmp
-
memory/936-57-0x000007FEF47E0000-0x000007FEF5203000-memory.dmpFilesize
10.1MB
-
memory/936-58-0x000007FEF3C80000-0x000007FEF47DD000-memory.dmpFilesize
11.4MB
-
memory/936-59-0x00000000024C4000-0x00000000024C7000-memory.dmpFilesize
12KB
-
memory/936-60-0x000000001B760000-0x000000001BA5F000-memory.dmpFilesize
3.0MB
-
memory/936-61-0x00000000024C4000-0x00000000024C7000-memory.dmpFilesize
12KB
-
memory/936-62-0x00000000024CB000-0x00000000024EA000-memory.dmpFilesize
124KB
-
memory/944-54-0x000007FEFC3B1000-0x000007FEFC3B3000-memory.dmpFilesize
8KB