Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11-08-2024 12:32
Static task
static1
Behavioral task
behavioral1
Sample
6ab8c652eaac3627f0e3420aa3d7a29de229e6f905d7180af589d3f47a3ecaa4.js
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6ab8c652eaac3627f0e3420aa3d7a29de229e6f905d7180af589d3f47a3ecaa4.js
Resource
win10v2004-20240802-en
General
-
Target
6ab8c652eaac3627f0e3420aa3d7a29de229e6f905d7180af589d3f47a3ecaa4.js
-
Size
27.4MB
-
MD5
d0015b3890d82fbb6dffbb1ab58538dd
-
SHA1
07b60ff9c3c3bd163b6783643eda3abb84393458
-
SHA256
6ab8c652eaac3627f0e3420aa3d7a29de229e6f905d7180af589d3f47a3ecaa4
-
SHA512
6a27ae112fef1339b7144c983529ff7188b6701db9d35a37bb3d5918c9db9f11d058fa3bad95e14842e6f6a6acbc1fc89381fd4e23a5d86287396b6cdfa376f4
-
SSDEEP
49152:YYRxr8uC0NjaCXjzgYRxr8uC0NjaCXjzgYRxr8uC0NjaCXjzgYRxr8uC0NjaCXj7:5lll7
Malware Config
Signatures
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid Process 656 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid Process Token: SeDebugPrivilege 656 powershell.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
taskeng.exewscript.EXEcscript.exedescription pid Process procid_target PID 3024 wrote to memory of 2636 3024 taskeng.exe 32 PID 3024 wrote to memory of 2636 3024 taskeng.exe 32 PID 3024 wrote to memory of 2636 3024 taskeng.exe 32 PID 2636 wrote to memory of 2660 2636 wscript.EXE 33 PID 2636 wrote to memory of 2660 2636 wscript.EXE 33 PID 2636 wrote to memory of 2660 2636 wscript.EXE 33 PID 2660 wrote to memory of 656 2660 cscript.exe 35 PID 2660 wrote to memory of 656 2660 cscript.exe 35 PID 2660 wrote to memory of 656 2660 cscript.exe 35 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\6ab8c652eaac3627f0e3420aa3d7a29de229e6f905d7180af589d3f47a3ecaa4.js1⤵PID:2536
-
C:\Windows\system32\taskeng.exetaskeng.exe {24A5A21B-F340-4F07-9EF7-23C7160E1564} S-1-5-21-2958949473-3205530200-1453100116-1000:WHMFPZKA\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\system32\wscript.EXEC:\Windows\system32\wscript.EXE PROCED~1.JS2⤵
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\System32\cscript.exe"C:\Windows\System32\cscript.exe" "PROCED~1.JS"3⤵
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:656
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39.9MB
MD514db8327f3d06483e5d6f8706fdda970
SHA1815ba490f015ef82dad4508dcb7221725e8a2b7e
SHA25633e6db73bf8254878a97874e591c11327a95b0386a2a034b63b53db4dc335c86
SHA512724a8398ce4dd8fc5e8420f66c5604927c9245014ec27a17112617a4a27b7966401f057c6f9b3477793cf4c5e67f95957d660a887cb642c70da22cec4bcaa756