Analysis
-
max time kernel
43s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
30-11-2022 09:37
Static task
static1
Behavioral task
behavioral1
Sample
AS.js
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
AS.js
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
fix/resetting.js
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
fix/resetting.js
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
fix/scaly.ps1
Resource
win7-20221111-en
Behavioral task
behavioral6
Sample
fix/scaly.ps1
Resource
win10v2004-20221111-en
General
-
Target
fix/resetting.js
-
Size
130B
-
MD5
07bea373c9154e9d1e952284573d78f2
-
SHA1
c3a5772930125410b68d9cea820a5c0b3ac6d266
-
SHA256
8d8618f5a460543cbefc214f1a63c63eccae9759096751f546c00ebf20f7be37
-
SHA512
7e7b8b651adf185b34366ef0be05608f49d5239a87dfe52bb1f6195820900f1d258f96b58db027dfa4aef9cfc95357433f6414808b47ad3816be825973fc28f5
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 1112 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 1112 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
wscript.exedescription pid process target process PID 1452 wrote to memory of 1112 1452 wscript.exe powershell.exe PID 1452 wrote to memory of 1112 1452 wscript.exe powershell.exe PID 1452 wrote to memory of 1112 1452 wscript.exe powershell.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\fix\resetting.js1⤵
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass fix\scaly.ps12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1112
-