Analysis

  • max time kernel
    119s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    03-04-2024 13:43

General

  • Target

    03042024_2143_Install.js

  • Size

    678KB

  • MD5

    550a5d0ef3c596a05e47361981c0fd17

  • SHA1

    ce47883964e4ca68c30f3dfdc5b8cfde416b4dec

  • SHA256

    5ede5ee989e327b0562583e3f7563d691b5c1a6ade7804d4c871df84633b5845

  • SHA512

    d68416e4abc50a5d8454f17feeda5a975004180283e06455fb8bc65d4a6c7e4ad3e089747e2a460f0ed050c0c0d4ebf3ef34522190a240378ae91dcdc78513c8

  • SSDEEP

    768:DkLpkLpkLpkLpkLpkLpkLpkLpkLpkLpkLpkLpkLpkLpkLpkLpkLpkLpkLD:DCCCCCCCCCCCCCCCCCCK

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Drops startup file 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 57 IoCs
  • Suspicious use of AdjustPrivilegeToken 19 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\03042024_2143_Install.js
    1⤵
    • Blocklisted process makes network request
    • Suspicious use of WriteProcessMemory
    PID:1664
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\tempScript.ps1"
      2⤵
      • Drops startup file
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2744
      • C:\Windows\system32\cmd.exe
        "C:\Windows\system32\cmd.exe" /c C:\Users\Admin\putty.cmd
        3⤵
          PID:2508
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\tempScript.ps1"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2524
        • C:\Windows\system32\cmd.exe
          "C:\Windows\system32\cmd.exe" /c C:\Users\Admin\putty.cmd
          3⤵
            PID:2636
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\tempScript.ps1"
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2440
          • C:\Windows\system32\cmd.exe
            "C:\Windows\system32\cmd.exe" /c C:\Users\Admin\putty.cmd
            3⤵
              PID:684
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\tempScript.ps1"
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:340
            • C:\Windows\system32\cmd.exe
              "C:\Windows\system32\cmd.exe" /c C:\Users\Admin\putty.cmd
              3⤵
                PID:1644
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\tempScript.ps1"
              2⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1032
              • C:\Windows\system32\cmd.exe
                "C:\Windows\system32\cmd.exe" /c C:\Users\Admin\putty.cmd
                3⤵
                  PID:1344
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\tempScript.ps1"
                2⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1768
                • C:\Windows\system32\cmd.exe
                  "C:\Windows\system32\cmd.exe" /c C:\Users\Admin\putty.cmd
                  3⤵
                    PID:2972
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\tempScript.ps1"
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:992
                  • C:\Windows\system32\cmd.exe
                    "C:\Windows\system32\cmd.exe" /c C:\Users\Admin\putty.cmd
                    3⤵
                      PID:2264
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\tempScript.ps1"
                    2⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:1556
                    • C:\Windows\system32\cmd.exe
                      "C:\Windows\system32\cmd.exe" /c C:\Users\Admin\putty.cmd
                      3⤵
                        PID:1988
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\tempScript.ps1"
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:2088
                      • C:\Windows\system32\cmd.exe
                        "C:\Windows\system32\cmd.exe" /c C:\Users\Admin\putty.cmd
                        3⤵
                          PID:3068
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\tempScript.ps1"
                        2⤵
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:1616
                        • C:\Windows\system32\cmd.exe
                          "C:\Windows\system32\cmd.exe" /c C:\Users\Admin\putty.cmd
                          3⤵
                            PID:2496
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\tempScript.ps1"
                          2⤵
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:2556
                          • C:\Windows\system32\cmd.exe
                            "C:\Windows\system32\cmd.exe" /c C:\Users\Admin\putty.cmd
                            3⤵
                              PID:2544
                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\tempScript.ps1"
                            2⤵
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2372
                            • C:\Windows\system32\cmd.exe
                              "C:\Windows\system32\cmd.exe" /c C:\Users\Admin\putty.cmd
                              3⤵
                                PID:2416
                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\tempScript.ps1"
                              2⤵
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2040
                              • C:\Windows\system32\cmd.exe
                                "C:\Windows\system32\cmd.exe" /c C:\Users\Admin\putty.cmd
                                3⤵
                                  PID:1920
                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\tempScript.ps1"
                                2⤵
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:860
                                • C:\Windows\system32\cmd.exe
                                  "C:\Windows\system32\cmd.exe" /c C:\Users\Admin\putty.cmd
                                  3⤵
                                    PID:1072
                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\tempScript.ps1"
                                  2⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1344
                                  • C:\Windows\system32\cmd.exe
                                    "C:\Windows\system32\cmd.exe" /c C:\Users\Admin\putty.cmd
                                    3⤵
                                      PID:2200
                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\tempScript.ps1"
                                    2⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:2408
                                    • C:\Windows\system32\cmd.exe
                                      "C:\Windows\system32\cmd.exe" /c C:\Users\Admin\putty.cmd
                                      3⤵
                                        PID:396
                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\tempScript.ps1"
                                      2⤵
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:1228
                                      • C:\Windows\system32\cmd.exe
                                        "C:\Windows\system32\cmd.exe" /c C:\Users\Admin\putty.cmd
                                        3⤵
                                          PID:912
                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\tempScript.ps1"
                                        2⤵
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:1988
                                        • C:\Windows\system32\cmd.exe
                                          "C:\Windows\system32\cmd.exe" /c C:\Users\Admin\putty.cmd
                                          3⤵
                                            PID:2896
                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\tempScript.ps1"
                                          2⤵
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:3068
                                          • C:\Windows\system32\cmd.exe
                                            "C:\Windows\system32\cmd.exe" /c C:\Users\Admin\putty.cmd
                                            3⤵
                                              PID:2792

                                        Network

                                        MITRE ATT&CK Matrix ATT&CK v13

                                        Replay Monitor

                                        Loading Replay Monitor...

                                        Downloads

                                        • C:\Users\Admin\AppData\Local\Temp\tempScript.ps1
                                          Filesize

                                          1KB

                                          MD5

                                          1449878eb9e0b72365906e10545b3a63

                                          SHA1

                                          27c596b59b6ff8024ba1e47a74a2d11a018315aa

                                          SHA256

                                          dcbee82699901eebd224bf5d350ecd713c947da38e7d4a1dc2be04744dd035c9

                                          SHA512

                                          ed78aa6441f6f5ea160257b19ed1515eb29bc6a05d6bfe887f8776f101028e5cc629387f51223a69876f459fe6af6b472ac595556e952e802746fc0bce329fad

                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
                                          Filesize

                                          7KB

                                          MD5

                                          a3e096d826767224c5de102c76cda71e

                                          SHA1

                                          700969c1d380376431e16d8d682ea10bba5a25a4

                                          SHA256

                                          9a819572ec656a2f3b2824db8baf08f019296b841b6c6c7b097bd59f430544f0

                                          SHA512

                                          32bdb6b7b00d542c569a291013e924a4d45953f61f8db675428a890ad6c7ba5b8be9aab1adf2a36e73d732951e5071e0bf4b79613f3c04c93ff58135460caf4c

                                        • \??\PIPE\srvsvc
                                          MD5

                                          d41d8cd98f00b204e9800998ecf8427e

                                          SHA1

                                          da39a3ee5e6b4b0d3255bfef95601890afd80709

                                          SHA256

                                          e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                          SHA512

                                          cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                        • memory/340-52-0x000007FEF4B60000-0x000007FEF54FD000-memory.dmp
                                          Filesize

                                          9.6MB

                                        • memory/340-53-0x00000000028A0000-0x0000000002920000-memory.dmp
                                          Filesize

                                          512KB

                                        • memory/340-54-0x000007FEF4B60000-0x000007FEF54FD000-memory.dmp
                                          Filesize

                                          9.6MB

                                        • memory/340-55-0x00000000028A0000-0x0000000002920000-memory.dmp
                                          Filesize

                                          512KB

                                        • memory/340-56-0x00000000028A0000-0x0000000002920000-memory.dmp
                                          Filesize

                                          512KB

                                        • memory/340-58-0x000007FEF4B60000-0x000007FEF54FD000-memory.dmp
                                          Filesize

                                          9.6MB

                                        • memory/992-98-0x0000000002900000-0x0000000002980000-memory.dmp
                                          Filesize

                                          512KB

                                        • memory/992-93-0x000007FEF5500000-0x000007FEF5E9D000-memory.dmp
                                          Filesize

                                          9.6MB

                                        • memory/992-94-0x0000000002900000-0x0000000002980000-memory.dmp
                                          Filesize

                                          512KB

                                        • memory/992-96-0x000007FEF5500000-0x000007FEF5E9D000-memory.dmp
                                          Filesize

                                          9.6MB

                                        • memory/992-97-0x0000000002900000-0x0000000002980000-memory.dmp
                                          Filesize

                                          512KB

                                        • memory/992-99-0x0000000002900000-0x0000000002980000-memory.dmp
                                          Filesize

                                          512KB

                                        • memory/992-100-0x000007FEF5500000-0x000007FEF5E9D000-memory.dmp
                                          Filesize

                                          9.6MB

                                        • memory/1032-65-0x000007FEF5500000-0x000007FEF5E9D000-memory.dmp
                                          Filesize

                                          9.6MB

                                        • memory/1032-66-0x0000000002500000-0x0000000002580000-memory.dmp
                                          Filesize

                                          512KB

                                        • memory/1032-67-0x000007FEF5500000-0x000007FEF5E9D000-memory.dmp
                                          Filesize

                                          9.6MB

                                        • memory/1032-68-0x0000000002500000-0x0000000002580000-memory.dmp
                                          Filesize

                                          512KB

                                        • memory/1032-69-0x0000000002500000-0x0000000002580000-memory.dmp
                                          Filesize

                                          512KB

                                        • memory/1032-71-0x0000000002500000-0x0000000002580000-memory.dmp
                                          Filesize

                                          512KB

                                        • memory/1032-72-0x000007FEF5500000-0x000007FEF5E9D000-memory.dmp
                                          Filesize

                                          9.6MB

                                        • memory/1556-110-0x00000000024D0000-0x0000000002550000-memory.dmp
                                          Filesize

                                          512KB

                                        • memory/1556-109-0x000007FEF4B60000-0x000007FEF54FD000-memory.dmp
                                          Filesize

                                          9.6MB

                                        • memory/1556-108-0x00000000024D0000-0x0000000002550000-memory.dmp
                                          Filesize

                                          512KB

                                        • memory/1556-107-0x000007FEF4B60000-0x000007FEF54FD000-memory.dmp
                                          Filesize

                                          9.6MB

                                        • memory/1556-111-0x00000000024D0000-0x0000000002550000-memory.dmp
                                          Filesize

                                          512KB

                                        • memory/1556-112-0x00000000024D0000-0x0000000002550000-memory.dmp
                                          Filesize

                                          512KB

                                        • memory/1556-114-0x000007FEF4B60000-0x000007FEF54FD000-memory.dmp
                                          Filesize

                                          9.6MB

                                        • memory/1616-135-0x000007FEF4B60000-0x000007FEF54FD000-memory.dmp
                                          Filesize

                                          9.6MB

                                        • memory/1616-136-0x00000000024F0000-0x0000000002570000-memory.dmp
                                          Filesize

                                          512KB

                                        • memory/1768-82-0x000007FEF4B60000-0x000007FEF54FD000-memory.dmp
                                          Filesize

                                          9.6MB

                                        • memory/1768-79-0x000007FEF4B60000-0x000007FEF54FD000-memory.dmp
                                          Filesize

                                          9.6MB

                                        • memory/1768-85-0x000007FEF4B60000-0x000007FEF54FD000-memory.dmp
                                          Filesize

                                          9.6MB

                                        • memory/1768-84-0x0000000002560000-0x00000000025E0000-memory.dmp
                                          Filesize

                                          512KB

                                        • memory/1768-83-0x0000000002560000-0x00000000025E0000-memory.dmp
                                          Filesize

                                          512KB

                                        • memory/1768-80-0x0000000002560000-0x00000000025E0000-memory.dmp
                                          Filesize

                                          512KB

                                        • memory/2088-122-0x000007FEF5500000-0x000007FEF5E9D000-memory.dmp
                                          Filesize

                                          9.6MB

                                        • memory/2088-123-0x0000000002800000-0x0000000002880000-memory.dmp
                                          Filesize

                                          512KB

                                        • memory/2088-124-0x000007FEF5500000-0x000007FEF5E9D000-memory.dmp
                                          Filesize

                                          9.6MB

                                        • memory/2088-125-0x0000000002800000-0x0000000002880000-memory.dmp
                                          Filesize

                                          512KB

                                        • memory/2088-126-0x0000000002800000-0x0000000002880000-memory.dmp
                                          Filesize

                                          512KB

                                        • memory/2088-128-0x000007FEF5500000-0x000007FEF5E9D000-memory.dmp
                                          Filesize

                                          9.6MB

                                        • memory/2440-44-0x000007FEF5500000-0x000007FEF5E9D000-memory.dmp
                                          Filesize

                                          9.6MB

                                        • memory/2440-38-0x000007FEF5500000-0x000007FEF5E9D000-memory.dmp
                                          Filesize

                                          9.6MB

                                        • memory/2440-39-0x00000000028C0000-0x0000000002940000-memory.dmp
                                          Filesize

                                          512KB

                                        • memory/2440-40-0x000007FEF5500000-0x000007FEF5E9D000-memory.dmp
                                          Filesize

                                          9.6MB

                                        • memory/2440-41-0x00000000028C0000-0x0000000002940000-memory.dmp
                                          Filesize

                                          512KB

                                        • memory/2440-42-0x00000000028C0000-0x0000000002940000-memory.dmp
                                          Filesize

                                          512KB

                                        • memory/2524-28-0x0000000001DB0000-0x0000000001E30000-memory.dmp
                                          Filesize

                                          512KB

                                        • memory/2524-25-0x000007FEF4B60000-0x000007FEF54FD000-memory.dmp
                                          Filesize

                                          9.6MB

                                        • memory/2524-26-0x0000000001DB0000-0x0000000001E30000-memory.dmp
                                          Filesize

                                          512KB

                                        • memory/2524-30-0x000007FEF4B60000-0x000007FEF54FD000-memory.dmp
                                          Filesize

                                          9.6MB

                                        • memory/2524-27-0x0000000001DB0000-0x0000000001E30000-memory.dmp
                                          Filesize

                                          512KB

                                        • memory/2524-21-0x000000001B190000-0x000000001B472000-memory.dmp
                                          Filesize

                                          2.9MB

                                        • memory/2524-24-0x0000000001DB0000-0x0000000001E30000-memory.dmp
                                          Filesize

                                          512KB

                                        • memory/2524-23-0x000007FEF4B60000-0x000007FEF54FD000-memory.dmp
                                          Filesize

                                          9.6MB

                                        • memory/2524-22-0x0000000001FC0000-0x0000000001FC8000-memory.dmp
                                          Filesize

                                          32KB

                                        • memory/2744-11-0x0000000001FC0000-0x0000000002040000-memory.dmp
                                          Filesize

                                          512KB

                                        • memory/2744-5-0x000000001B340000-0x000000001B622000-memory.dmp
                                          Filesize

                                          2.9MB

                                        • memory/2744-14-0x000007FEF5500000-0x000007FEF5E9D000-memory.dmp
                                          Filesize

                                          9.6MB

                                        • memory/2744-12-0x0000000001FC0000-0x0000000002040000-memory.dmp
                                          Filesize

                                          512KB

                                        • memory/2744-10-0x000007FEF5500000-0x000007FEF5E9D000-memory.dmp
                                          Filesize

                                          9.6MB

                                        • memory/2744-6-0x00000000024E0000-0x00000000024E8000-memory.dmp
                                          Filesize

                                          32KB

                                        • memory/2744-9-0x0000000001FC0000-0x0000000002040000-memory.dmp
                                          Filesize

                                          512KB

                                        • memory/2744-8-0x000007FEF5500000-0x000007FEF5E9D000-memory.dmp
                                          Filesize

                                          9.6MB