Analysis
-
max time kernel
5s -
max time network
35s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
30-11-2022 13:56
Static task
static1
Behavioral task
behavioral1
Sample
AS.js
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
AS.js
Resource
win10v2004-20220901-en
Behavioral task
behavioral3
Sample
fix/if.ps1
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
fix/if.ps1
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
fix/probing.js
Resource
win7-20221111-en
Behavioral task
behavioral6
Sample
fix/probing.js
Resource
win10v2004-20221111-en
General
-
Target
fix/probing.js
-
Size
127B
-
MD5
6eaf213bc89d562cec1a50227e681dbe
-
SHA1
e4a652b60eb7cf8407ca76f75c9fe9372c02052a
-
SHA256
699f8221ec372afa2ad90aba988d0a91b9ec31a34f12575c2d19159ab5b58810
-
SHA512
4cb7af2a78d2e95583f86d2c637c65d4771ea51a3d4cc30ff3ed342165b95d81d658f7f5c21e43c845feb9cfb3f66ee5700f8a107d6d51b59a89eece9545c151
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 592 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 592 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
wscript.exedescription pid process target process PID 1408 wrote to memory of 592 1408 wscript.exe powershell.exe PID 1408 wrote to memory of 592 1408 wscript.exe powershell.exe PID 1408 wrote to memory of 592 1408 wscript.exe powershell.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\fix\probing.js1⤵
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass fix\if.ps12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:592
-