Analysis
-
max time kernel
1612s -
max time network
1614s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
13/02/2023, 21:24
Static task
static1
Behavioral task
behavioral1
Sample
spooki.js
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
spooki.js
Resource
win10v2004-20221111-en
General
-
Target
spooki.js
-
Size
66KB
-
MD5
c93eb2574a0b549f06fa495de52f8135
-
SHA1
d5c6b541ebea9cda17ee4985e015c15613b2b64f
-
SHA256
78cd8f64193207e61119ce1f9db37462796896ef2e2244454c630f504c0bc126
-
SHA512
564faf0d0f1fd9aaf6030d491436691d4acd99cf4937b4e69e17824ba5db220735e17910330121376a4df320aaa9ef35599754b99bd68730ea679b701cbd7e12
-
SSDEEP
768:vWw7n5D87ZwfbDsA3spXsqF3SReX/lPaXGl+wKyYxYTSbjKC8sTvl:3WVADsekNFPlPay+B4+b
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 976 PoWeRshelL.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 976 PoWeRshelL.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1220 wrote to memory of 1500 1220 taskeng.exe 29 PID 1220 wrote to memory of 1500 1220 taskeng.exe 29 PID 1220 wrote to memory of 1500 1220 taskeng.exe 29 PID 1500 wrote to memory of 1664 1500 wscript.EXE 30 PID 1500 wrote to memory of 1664 1500 wscript.EXE 30 PID 1500 wrote to memory of 1664 1500 wscript.EXE 30 PID 1664 wrote to memory of 976 1664 cscript.exe 32 PID 1664 wrote to memory of 976 1664 cscript.exe 32 PID 1664 wrote to memory of 976 1664 cscript.exe 32
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\spooki.js1⤵PID:1404
-
C:\Windows\system32\taskeng.exetaskeng.exe {2BB7F528-FA61-4242-A46A-A6D2211E971B} S-1-5-21-2292972927-2705560509-2768824231-1000:GRXNNIIE\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Windows\system32\wscript.EXEC:\Windows\system32\wscript.EXE INTERA~1.JS2⤵
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Windows\System32\cscript.exe"C:\Windows\System32\cscript.exe" "INTERA~1.JS"3⤵
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\System32\WindowsPowerShell\v1.0\PoWeRshelL.exePoWeRshelL4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:976
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40.6MB
MD57bba5c40a90d7c2249fd7463d3ef5807
SHA16e7c3e91ed3d8382b112f58b3a84ae41d7adc60e
SHA256f45529a6a1bcc98bf37ed3d2844575920f4ffa3f0234629a154ffd245085c945
SHA512986241dbe472dc7e91d23ecb1a2f9bb42d2f464edb52866125040290eb14a5656b337a8262a0576cd8e7307864788b06349da86997fc77944a17030c66569464