Analysis
-
max time kernel
299s -
max time network
186s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
13/01/2023, 01:55
Static task
static1
Behavioral task
behavioral1
Sample
Remote Data Capture.js
Resource
win10-20220812-en
4 signatures
300 seconds
Behavioral task
behavioral2
Sample
Remote Data Capture.js
Resource
win10v2004-20220812-en
5 signatures
300 seconds
General
-
Target
Remote Data Capture.js
-
Size
40.2MB
-
MD5
2e06e9b6efe884a4cea4cb4f04ad367f
-
SHA1
1ca9d2689e2b0011bcf3815422eb6824a0cdc441
-
SHA256
e955ed3d0c5b516ff06a2ce13fa8247d3ed613d8e59ef89b035d75c915bed9fe
-
SHA512
c32c61ea76da3d0b692ab0d198ec4c6e0f50e191c876a95a7d3baf8a49d741f1666a4fdb936182fc382aec089b8cf52d456a856139b5588b76c26acc1f068c17
-
SSDEEP
49152:NCuLoRXKMsxJiYKPbpPoyO498yqJKcx/81XvKL+YKQvj5+Y2x1fuHk+u06+lTm1n:C
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 4072 POwERSHeLl.exe 4072 POwERSHeLl.exe 4072 POwERSHeLl.exe 4072 POwERSHeLl.exe 4072 POwERSHeLl.exe 4072 POwERSHeLl.exe 4072 POwERSHeLl.exe 4072 POwERSHeLl.exe 4072 POwERSHeLl.exe 4072 POwERSHeLl.exe 4072 POwERSHeLl.exe 4072 POwERSHeLl.exe 4072 POwERSHeLl.exe 4072 POwERSHeLl.exe 4072 POwERSHeLl.exe 4072 POwERSHeLl.exe 4072 POwERSHeLl.exe 4072 POwERSHeLl.exe 4072 POwERSHeLl.exe 4072 POwERSHeLl.exe 4072 POwERSHeLl.exe 4072 POwERSHeLl.exe 4072 POwERSHeLl.exe 4072 POwERSHeLl.exe 4072 POwERSHeLl.exe 4072 POwERSHeLl.exe 4072 POwERSHeLl.exe 4072 POwERSHeLl.exe 4072 POwERSHeLl.exe 4072 POwERSHeLl.exe 4072 POwERSHeLl.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4072 POwERSHeLl.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2508 wrote to memory of 2756 2508 wscript.exe 66 PID 2508 wrote to memory of 2756 2508 wscript.exe 66 PID 2756 wrote to memory of 4072 2756 cscript.exe 68 PID 2756 wrote to memory of 4072 2756 cscript.exe 68
Processes
-
C:\Windows\system32\wscript.exewscript.exe "C:\Users\Admin\AppData\Local\Temp\Remote Data Capture.js"1⤵
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\System32\cscript.exe"C:\Windows\System32\cscript.exe" "Remote Data Capture.js"2⤵
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\System32\WindowsPowerShell\v1.0\POwERSHeLl.exePOwERSHeLl3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4072
-
-