Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-09-2024 01:39
Static task
static1
Behavioral task
behavioral1
Sample
46809b2974a9f6e54502095f81fa1ea45db0670cabff2769e495ce24525b201a.js
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
46809b2974a9f6e54502095f81fa1ea45db0670cabff2769e495ce24525b201a.js
Resource
win10v2004-20240802-en
General
-
Target
46809b2974a9f6e54502095f81fa1ea45db0670cabff2769e495ce24525b201a.js
-
Size
8.0MB
-
MD5
5c0f1cf13dbeea07797df26039253965
-
SHA1
2799006c6a819c88922788e631d774975d56b252
-
SHA256
46809b2974a9f6e54502095f81fa1ea45db0670cabff2769e495ce24525b201a
-
SHA512
486b571963c9b40023caf43325613c6a4b28ec48dccc74f1e1b6ceaf2ded1ef11daf7e774128614de9d896ff91fa8e84f976bc8e55629963f70d3b1eff16b55f
-
SSDEEP
49152:l49cXRna4lwacW94G/s+LfHQa49cXRna4lwacW94G/s+LfHQa49cXRna4lwacW9n:lvtvtvtvtvtv/
Malware Config
Signatures
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid Process 2108 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid Process Token: SeDebugPrivilege 2108 powershell.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
taskeng.exewscript.EXEcscript.exedescription pid Process procid_target PID 264 wrote to memory of 344 264 taskeng.exe 32 PID 264 wrote to memory of 344 264 taskeng.exe 32 PID 264 wrote to memory of 344 264 taskeng.exe 32 PID 344 wrote to memory of 2168 344 wscript.EXE 33 PID 344 wrote to memory of 2168 344 wscript.EXE 33 PID 344 wrote to memory of 2168 344 wscript.EXE 33 PID 2168 wrote to memory of 2108 2168 cscript.exe 35 PID 2168 wrote to memory of 2108 2168 cscript.exe 35 PID 2168 wrote to memory of 2108 2168 cscript.exe 35 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\46809b2974a9f6e54502095f81fa1ea45db0670cabff2769e495ce24525b201a.js1⤵PID:2728
-
C:\Windows\system32\taskeng.exetaskeng.exe {F63B6589-B94F-4FFD-998C-AB6E5E69DA0C} S-1-5-21-3533259084-2542256011-65585152-1000:XPAJOTIY\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:264 -
C:\Windows\system32\wscript.EXEC:\Windows\system32\wscript.EXE FEDERA~1.JS2⤵
- Suspicious use of WriteProcessMemory
PID:344 -
C:\Windows\System32\cscript.exe"C:\Windows\System32\cscript.exe" "FEDERA~1.JS"3⤵
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2108
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42.2MB
MD58ff2fe9eee38b2894914567a5cfb7958
SHA16d6fcd68daae11ccbf4b96719981e5d2e422c90f
SHA2565069eb4f88a6000ed9dc88270aceee64d20a9150416c262c40017f1be124a5bd
SHA5125b5a23ed2870cbd3b3abc2175b0e8ea60d27aa9a2ac9fa322ae5f8bcb8eb1e54f804a9c3a437c8f2de2a7aa05c9d09fc7fe79da4909beafb562be257781a2585