Analysis

  • max time kernel
    1751s
  • max time network
    1170s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-09-2023 14:30

General

  • Target

    discord-reg/bypass/browser/node_modules/content-disposition/README.js

  • Size

    5KB

  • MD5

    cbd415ae5e4605f9ce13640c323d8aaf

  • SHA1

    e1d109d584a63de2418adfd8fb59b298d0d9368e

  • SHA256

    871c5ec648b67ad1a5791c6c4f95e5bb5df78ecc9aae0a3387e2a08e068c6968

  • SHA512

    4454179d3ddeeb49393df168db1867d19054c44b60e1da5ff5555d26a8f0ba9cc5f3d5dadce76ebcf0110924c440a10e01969ff701076a38a2ff8673db6325d9

  • SSDEEP

    96:eXCnQ5B17X/AU4M58ZBB/WfUt41lFXTpGa+O/iOu:eyAFXz58ZBMT1l9bru

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\discord-reg\bypass\browser\node_modules\content-disposition\README.js
    1⤵
      PID:2080
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
      1⤵
        PID:3880
      • C:\Windows\System32\svchost.exe
        C:\Windows\System32\svchost.exe -k UnistackSvcGroup
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3196

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/3196-0-0x000002205F740000-0x000002205F750000-memory.dmp

        Filesize

        64KB

      • memory/3196-16-0x000002205F840000-0x000002205F850000-memory.dmp

        Filesize

        64KB

      • memory/3196-32-0x0000022067B30000-0x0000022067B31000-memory.dmp

        Filesize

        4KB

      • memory/3196-34-0x0000022067B60000-0x0000022067B61000-memory.dmp

        Filesize

        4KB

      • memory/3196-35-0x0000022067B60000-0x0000022067B61000-memory.dmp

        Filesize

        4KB

      • memory/3196-36-0x0000022067C70000-0x0000022067C71000-memory.dmp

        Filesize

        4KB