Analysis

  • max time kernel
    111s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-05-2023 17:13

General

  • Target

    message.js

  • Size

    34KB

  • MD5

    47e5fb9ea1387c2fad8ff5d4a7ee89f5

  • SHA1

    97af46fce0c87dced5a7fc3f1279de1ef38dd8e7

  • SHA256

    628815d11c5aa782840f177991583669e4bd6474d0558a9b357e601d43406f8f

  • SHA512

    0ac2366927d7bed64bb5e4ff014cbdcd005bf2de9152e6544e401678dc8ab282f2ff3c045d02226cf4edabe046acd153634618e95e7a67d5626e0abcfc22eb39

  • SSDEEP

    384:EdL4toYmWWHJ+gLyTwV0O/ETTxTTINYACU8E:EdUXEHJ+gmFTTxTTK7

Score
1/10

Malware Config

Signatures

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 34 IoCs
  • Suspicious use of SendNotifyMessage 34 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\message.js
    1⤵
      PID:3492
    • C:\Windows\system32\taskmgr.exe
      "C:\Windows\system32\taskmgr.exe" /7
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1852

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1852-134-0x00000166A5EB0000-0x00000166A5EB1000-memory.dmp

      Filesize

      4KB

    • memory/1852-133-0x00000166A5EB0000-0x00000166A5EB1000-memory.dmp

      Filesize

      4KB

    • memory/1852-135-0x00000166A5EB0000-0x00000166A5EB1000-memory.dmp

      Filesize

      4KB

    • memory/1852-139-0x00000166A5EB0000-0x00000166A5EB1000-memory.dmp

      Filesize

      4KB

    • memory/1852-141-0x00000166A5EB0000-0x00000166A5EB1000-memory.dmp

      Filesize

      4KB

    • memory/1852-140-0x00000166A5EB0000-0x00000166A5EB1000-memory.dmp

      Filesize

      4KB

    • memory/1852-142-0x00000166A5EB0000-0x00000166A5EB1000-memory.dmp

      Filesize

      4KB

    • memory/1852-143-0x00000166A5EB0000-0x00000166A5EB1000-memory.dmp

      Filesize

      4KB

    • memory/1852-145-0x00000166A5EB0000-0x00000166A5EB1000-memory.dmp

      Filesize

      4KB

    • memory/1852-144-0x00000166A5EB0000-0x00000166A5EB1000-memory.dmp

      Filesize

      4KB