Analysis
-
max time kernel
1375s -
max time network
1156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
29-09-2023 21:21
Static task
static1
Behavioral task
behavioral1
Sample
TikTok-18-PLUS-v1.3.6.apk
Resource
android-x86-arm-20230831-en
Behavioral task
behavioral2
Sample
WebViewJavascriptBridge.js
Resource
win7-20230831-en
Behavioral task
behavioral3
Sample
WebViewJavascriptBridge.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral4
Sample
videoCtrl.js
Resource
win7-20230831-en
Behavioral task
behavioral5
Sample
videoCtrl.js
Resource
win10v2004-20230915-en
General
-
Target
videoCtrl.js
-
Size
3KB
-
MD5
6dc93bdf237b3dc0b4a351748279e4a9
-
SHA1
cbb3d7d1bb00e7068500fed4fa7a4633527bc13a
-
SHA256
e669f7cf6b4d848e9f9f3636a20016d462da0a0e4ffa4b3eba6710a7122b57e1
-
SHA512
b611e25c22a4056e2756bffab44346b951322014cc0c385708a7d8fa268eb0142e2d81ce759ce1bedc35942a6440c2198d1b055c0a0e1a21ab93b524ee2a4b5a
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 3484 svchost.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\videoCtrl.js1⤵PID:1032
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:1316
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3484