Analysis

  • max time kernel
    1799s
  • max time network
    1166s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-09-2023 14:30

General

  • Target

    discord-reg/bypass/browser/node_modules/cookie-signature/index.js

  • Size

    1KB

  • MD5

    a9634aa95d321b9a6d90bec5d3d23937

  • SHA1

    bb5c2c0a463aa10074caf991f67681231b1f0c21

  • SHA256

    8d762862020064468b4af17e561ee1ee29d9d55311a1c19d958c4ff2be912963

  • SHA512

    214e27edb4367aa2ef322c4d857a918ebd57bc825646184f90fa6911f830b3755fce1fdff30a5d231ea11ba4ddd82b4f2afc36451289f0b4334c445e9a26dc48

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\discord-reg\bypass\browser\node_modules\cookie-signature\index.js
    1⤵
      PID:4068
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
      1⤵
        PID:3656
      • C:\Windows\System32\svchost.exe
        C:\Windows\System32\svchost.exe -k UnistackSvcGroup
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1652

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1652-0-0x0000020D61240000-0x0000020D61250000-memory.dmp

        Filesize

        64KB

      • memory/1652-16-0x0000020D61340000-0x0000020D61350000-memory.dmp

        Filesize

        64KB

      • memory/1652-32-0x0000020D69660000-0x0000020D69661000-memory.dmp

        Filesize

        4KB

      • memory/1652-34-0x0000020D69690000-0x0000020D69691000-memory.dmp

        Filesize

        4KB

      • memory/1652-35-0x0000020D69690000-0x0000020D69691000-memory.dmp

        Filesize

        4KB

      • memory/1652-36-0x0000020D697A0000-0x0000020D697A1000-memory.dmp

        Filesize

        4KB