Analysis
-
max time kernel
63s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
22-08-2023 20:54
Static task
static1
Behavioral task
behavioral1
Sample
cp.js
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
cp.js
Resource
win10v2004-20230703-en
General
-
Target
cp.js
-
Size
6KB
-
MD5
bd5a3809a172cc1733e1304ce7717dcd
-
SHA1
5266973b0603befcb6a9d32fa2ec5f472b64d14b
-
SHA256
845d98a632152ab59ae2ffa98544b9c7a7f7753a916e5046984b8324a6318db5
-
SHA512
98320330b4ce4b727bd681df3b947bfc3722c0fdc6fea161317fd521222aa4401814d2d90ce295b31ae6cb2fd7d70a602cf66e93e21cf028ef68229c8e9501f9
-
SSDEEP
192:cmoaunhxnELtwQthgoNzsALabtpORIWSq2SB:cdacxUa2goNze5pOGcB
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1632 chrome.exe 1632 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1632 wrote to memory of 2612 1632 chrome.exe 31 PID 1632 wrote to memory of 2612 1632 chrome.exe 31 PID 1632 wrote to memory of 2612 1632 chrome.exe 31 PID 1632 wrote to memory of 2868 1632 chrome.exe 33 PID 1632 wrote to memory of 2868 1632 chrome.exe 33 PID 1632 wrote to memory of 2868 1632 chrome.exe 33 PID 1632 wrote to memory of 2868 1632 chrome.exe 33 PID 1632 wrote to memory of 2868 1632 chrome.exe 33 PID 1632 wrote to memory of 2868 1632 chrome.exe 33 PID 1632 wrote to memory of 2868 1632 chrome.exe 33 PID 1632 wrote to memory of 2868 1632 chrome.exe 33 PID 1632 wrote to memory of 2868 1632 chrome.exe 33 PID 1632 wrote to memory of 2868 1632 chrome.exe 33 PID 1632 wrote to memory of 2868 1632 chrome.exe 33 PID 1632 wrote to memory of 2868 1632 chrome.exe 33 PID 1632 wrote to memory of 2868 1632 chrome.exe 33 PID 1632 wrote to memory of 2868 1632 chrome.exe 33 PID 1632 wrote to memory of 2868 1632 chrome.exe 33 PID 1632 wrote to memory of 2868 1632 chrome.exe 33 PID 1632 wrote to memory of 2868 1632 chrome.exe 33 PID 1632 wrote to memory of 2868 1632 chrome.exe 33 PID 1632 wrote to memory of 2868 1632 chrome.exe 33 PID 1632 wrote to memory of 2868 1632 chrome.exe 33 PID 1632 wrote to memory of 2868 1632 chrome.exe 33 PID 1632 wrote to memory of 2868 1632 chrome.exe 33 PID 1632 wrote to memory of 2868 1632 chrome.exe 33 PID 1632 wrote to memory of 2868 1632 chrome.exe 33 PID 1632 wrote to memory of 2868 1632 chrome.exe 33 PID 1632 wrote to memory of 2868 1632 chrome.exe 33 PID 1632 wrote to memory of 2868 1632 chrome.exe 33 PID 1632 wrote to memory of 2868 1632 chrome.exe 33 PID 1632 wrote to memory of 2868 1632 chrome.exe 33 PID 1632 wrote to memory of 2868 1632 chrome.exe 33 PID 1632 wrote to memory of 2868 1632 chrome.exe 33 PID 1632 wrote to memory of 2868 1632 chrome.exe 33 PID 1632 wrote to memory of 2868 1632 chrome.exe 33 PID 1632 wrote to memory of 2868 1632 chrome.exe 33 PID 1632 wrote to memory of 2868 1632 chrome.exe 33 PID 1632 wrote to memory of 2868 1632 chrome.exe 33 PID 1632 wrote to memory of 2868 1632 chrome.exe 33 PID 1632 wrote to memory of 2868 1632 chrome.exe 33 PID 1632 wrote to memory of 2868 1632 chrome.exe 33 PID 1632 wrote to memory of 2852 1632 chrome.exe 34 PID 1632 wrote to memory of 2852 1632 chrome.exe 34 PID 1632 wrote to memory of 2852 1632 chrome.exe 34 PID 1632 wrote to memory of 2940 1632 chrome.exe 35 PID 1632 wrote to memory of 2940 1632 chrome.exe 35 PID 1632 wrote to memory of 2940 1632 chrome.exe 35 PID 1632 wrote to memory of 2940 1632 chrome.exe 35 PID 1632 wrote to memory of 2940 1632 chrome.exe 35 PID 1632 wrote to memory of 2940 1632 chrome.exe 35 PID 1632 wrote to memory of 2940 1632 chrome.exe 35 PID 1632 wrote to memory of 2940 1632 chrome.exe 35 PID 1632 wrote to memory of 2940 1632 chrome.exe 35 PID 1632 wrote to memory of 2940 1632 chrome.exe 35 PID 1632 wrote to memory of 2940 1632 chrome.exe 35 PID 1632 wrote to memory of 2940 1632 chrome.exe 35 PID 1632 wrote to memory of 2940 1632 chrome.exe 35 PID 1632 wrote to memory of 2940 1632 chrome.exe 35 PID 1632 wrote to memory of 2940 1632 chrome.exe 35 PID 1632 wrote to memory of 2940 1632 chrome.exe 35 PID 1632 wrote to memory of 2940 1632 chrome.exe 35 PID 1632 wrote to memory of 2940 1632 chrome.exe 35 PID 1632 wrote to memory of 2940 1632 chrome.exe 35
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\cp.js1⤵PID:2388
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6209758,0x7fef6209768,0x7fef62097782⤵PID:2612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1140 --field-trial-handle=1232,i,4716445545021166519,2976216225298781309,131072 /prefetch:22⤵PID:2868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1532 --field-trial-handle=1232,i,4716445545021166519,2976216225298781309,131072 /prefetch:82⤵PID:2852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1644 --field-trial-handle=1232,i,4716445545021166519,2976216225298781309,131072 /prefetch:82⤵PID:2940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=1472 --field-trial-handle=1232,i,4716445545021166519,2976216225298781309,131072 /prefetch:12⤵PID:2736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2324 --field-trial-handle=1232,i,4716445545021166519,2976216225298781309,131072 /prefetch:12⤵PID:2280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1140 --field-trial-handle=1232,i,4716445545021166519,2976216225298781309,131072 /prefetch:22⤵PID:2040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3176 --field-trial-handle=1232,i,4716445545021166519,2976216225298781309,131072 /prefetch:12⤵PID:2908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3432 --field-trial-handle=1232,i,4716445545021166519,2976216225298781309,131072 /prefetch:82⤵PID:1080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3552 --field-trial-handle=1232,i,4716445545021166519,2976216225298781309,131072 /prefetch:82⤵PID:436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2652 --field-trial-handle=1232,i,4716445545021166519,2976216225298781309,131072 /prefetch:82⤵PID:1088
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1708
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
4KB
MD543736b0bd84529338a7a3056e4acb8c3
SHA1a0a64d38b5e514e65c2a4a1560e7421d24dba37d
SHA256a91556c133f0280a25a597bdf24ba30db286c6bd4a939305931b28ff379a4cf2
SHA5125cd517cb4794d63c127cf8eedaa91a75ade4ac60b84e22383c007327f53f7cdb0e695e7b255c4cb6a48751e797d743448601840d0807d244f34eb45457d74c66
-
Filesize
4KB
MD516142730e08d617d31297e50c3dbc2fe
SHA1f5a434daec67f3235fcea8f202707e87f585eaef
SHA256f4103748ea9107d3c54e0adb3b3c06586b2ad2c56c240ad905cd9e26b888328d
SHA512263a8200e061cfaa4e83c1d760f54be6749543181303d8dd016c74ac5c99f2332879f8bcd1fb0b067fcd3e4771dd0c11202cb964b08cdc324835717bee0d5446
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2