Analysis

  • max time kernel
    43s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    01-09-2022 13:12

General

  • Target

    Windows/CSC/v2.0.6/namespace/emea.ajgco.com/emeadata/PVS_UserData/mjlong/Downloads/36556907235_Apr_10_2019.js

  • Size

    3KB

  • MD5

    5c89926e42de10e2cc945b05101cf37d

  • SHA1

    4fafb12318522ee04099bc1adcaf911b2441e41f

  • SHA256

    fded1345d0108bf6da569dbb8b00e143b393e89c87cb201965cd1da0631ad4a8

  • SHA512

    9680591dc757ca47287c94c1780e6cee0ff8020d80e8b02667c62c608176611275dc8da586bc82ef75d7ee2028bde2f95a54b63d960004a216611107742bf641

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 11 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\Windows\CSC\v2.0.6\namespace\emea.ajgco.com\emeadata\PVS_UserData\mjlong\Downloads\36556907235_Apr_10_2019.js
    1⤵
    • Blocklisted process makes network request
    • Modifies system certificate store
    PID:768
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:832
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0xc4
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:672

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Install Root Certificate

    1
    T1130

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/768-54-0x000007FEFC521000-0x000007FEFC523000-memory.dmp
      Filesize

      8KB