Overview
overview
7Static
static
1Trojan.JS....!.html
windows7-x64
1Trojan.JS....!.html
windows10-2004-x64
1Trojan.JS....ax.msi
windows7-x64
7Trojan.JS....ax.msi
windows10-2004-x64
7Trojan.JS....ot.png
windows7-x64
1Trojan.JS....ot.png
windows10-2004-x64
3Trojan.JS....sh.cab
windows7-x64
1Trojan.JS....sh.cab
windows10-2004-x64
1FP_AX_CAB_...64.exe
windows7-x64
3FP_AX_CAB_...64.exe
windows10-2004-x64
5swflash64.inf
windows7-x64
1swflash64.inf
windows10-2004-x64
1Trojan.JS....you.js
windows7-x64
1Trojan.JS....you.js
windows10-2004-x64
1Trojan.JS....l.html
windows7-x64
1Trojan.JS....l.html
windows10-2004-x64
1Trojan.JS....ax.msi
windows7-x64
7Trojan.JS....ax.msi
windows10-2004-x64
7Trojan.JS....sh.cab
windows7-x64
1Trojan.JS....sh.cab
windows10-2004-x64
1Trojan.JS....you.js
windows7-x64
1Trojan.JS....you.js
windows10-2004-x64
1Trojan.JS....!.html
windows7-x64
1Trojan.JS....!.html
windows10-2004-x64
1Trojan.JS....you.js
windows7-x64
1Trojan.JS....you.js
windows10-2004-x64
1Trojan.JS....l.html
windows7-x64
1Trojan.JS....l.html
windows10-2004-x64
1Trojan.JS....you.js
windows7-x64
1Trojan.JS....you.js
windows10-2004-x64
1Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
05/11/2023, 15:57
Static task
static1
Behavioral task
behavioral1
Sample
Trojan.JS.Youareanidiot-main/Mostly Local/Idiot!.html
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
Trojan.JS.Youareanidiot-main/Mostly Local/Idiot!.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral3
Sample
Trojan.JS.Youareanidiot-main/Mostly Local/Idiot!_files/flashplayer32_0r0_371_winax.msi
Resource
win7-20231020-en
Behavioral task
behavioral4
Sample
Trojan.JS.Youareanidiot-main/Mostly Local/Idiot!_files/flashplayer32_0r0_371_winax.msi
Resource
win10v2004-20231025-en
Behavioral task
behavioral5
Sample
Trojan.JS.Youareanidiot-main/Mostly Local/Idiot!_files/idiot.png
Resource
win7-20231023-en
Behavioral task
behavioral6
Sample
Trojan.JS.Youareanidiot-main/Mostly Local/Idiot!_files/idiot.png
Resource
win10v2004-20231023-en
Behavioral task
behavioral7
Sample
Trojan.JS.Youareanidiot-main/Mostly Local/Idiot!_files/swflash.cab
Resource
win7-20231023-en
Behavioral task
behavioral8
Sample
Trojan.JS.Youareanidiot-main/Mostly Local/Idiot!_files/swflash.cab
Resource
win10v2004-20231020-en
Behavioral task
behavioral9
Sample
FP_AX_CAB_INSTALLER64.exe
Resource
win7-20231020-en
Behavioral task
behavioral10
Sample
FP_AX_CAB_INSTALLER64.exe
Resource
win10v2004-20231025-en
Behavioral task
behavioral11
Sample
swflash64.inf
Resource
win7-20231020-en
Behavioral task
behavioral12
Sample
swflash64.inf
Resource
win10v2004-20231023-en
Behavioral task
behavioral13
Sample
Trojan.JS.Youareanidiot-main/Mostly Local/Idiot!_files/you.js
Resource
win7-20231023-en
Behavioral task
behavioral14
Sample
Trojan.JS.Youareanidiot-main/Mostly Local/Idiot!_files/you.js
Resource
win10v2004-20231023-en
Behavioral task
behavioral15
Sample
Trojan.JS.Youareanidiot-main/Mostly Local/lol.html
Resource
win7-20231023-en
Behavioral task
behavioral16
Sample
Trojan.JS.Youareanidiot-main/Mostly Local/lol.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral17
Sample
Trojan.JS.Youareanidiot-main/Mostly Local/lol_files/flashplayer32_0r0_371_winax.msi
Resource
win7-20231020-en
Behavioral task
behavioral18
Sample
Trojan.JS.Youareanidiot-main/Mostly Local/lol_files/flashplayer32_0r0_371_winax.msi
Resource
win10v2004-20231025-en
Behavioral task
behavioral19
Sample
Trojan.JS.Youareanidiot-main/Mostly Local/lol_files/swflash.cab
Resource
win7-20231020-en
Behavioral task
behavioral20
Sample
Trojan.JS.Youareanidiot-main/Mostly Local/lol_files/swflash.cab
Resource
win10v2004-20231023-en
Behavioral task
behavioral21
Sample
Trojan.JS.Youareanidiot-main/Mostly Local/lol_files/you.js
Resource
win7-20231023-en
Behavioral task
behavioral22
Sample
Trojan.JS.Youareanidiot-main/Mostly Local/lol_files/you.js
Resource
win10v2004-20231023-en
Behavioral task
behavioral23
Sample
Trojan.JS.Youareanidiot-main/Mostly Online/Idiot!.html
Resource
win7-20231023-en
Behavioral task
behavioral24
Sample
Trojan.JS.Youareanidiot-main/Mostly Online/Idiot!.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral25
Sample
Trojan.JS.Youareanidiot-main/Mostly Online/Idiot!_files/you.js
Resource
win7-20231025-en
Behavioral task
behavioral26
Sample
Trojan.JS.Youareanidiot-main/Mostly Online/Idiot!_files/you.js
Resource
win10v2004-20231020-en
Behavioral task
behavioral27
Sample
Trojan.JS.Youareanidiot-main/Mostly Online/lol.html
Resource
win7-20231020-en
Behavioral task
behavioral28
Sample
Trojan.JS.Youareanidiot-main/Mostly Online/lol.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral29
Sample
Trojan.JS.Youareanidiot-main/Mostly Online/lol_files/you.js
Resource
win7-20231023-en
Behavioral task
behavioral30
Sample
Trojan.JS.Youareanidiot-main/Mostly Online/lol_files/you.js
Resource
win10v2004-20231023-en
General
-
Target
Trojan.JS.Youareanidiot-main/Mostly Local/Idiot!_files/flashplayer32_0r0_371_winax.msi
-
Size
20.9MB
-
MD5
ee8a1e16c9c520929c565ea7c97b3189
-
SHA1
77fe833fb091475fd4cff01135273731c64d04c5
-
SHA256
06adb72a820e100c2ce2bf65605bebf835fbd0447b882a9ed6e99a340ba0f843
-
SHA512
c480be9096a4f4f384705f0e91dc3887ce507fd5670e64f571f8abcb079cdbdd07b85b9a1576cc97bb482adb6b8f12f33a5b0e17f1a27860b4321a1d673c614b
-
SSDEEP
393216:mktMY5dmLqNyGgUVuXb9eDjtUj7gNZyQLfrtjJ1b9Rd9vwRQYiPzDaOg:PfmewkuXpYsykSjJFb0RQbft
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1816 MsiExec.exe -
Blocklisted process makes network request 3 IoCs
flow pid Process 3 2024 msiexec.exe 5 2024 msiexec.exe 7 2024 msiexec.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\V: msiexec.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2024 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2024 msiexec.exe Token: SeIncreaseQuotaPrivilege 2024 msiexec.exe Token: SeRestorePrivilege 2080 msiexec.exe Token: SeTakeOwnershipPrivilege 2080 msiexec.exe Token: SeSecurityPrivilege 2080 msiexec.exe Token: SeCreateTokenPrivilege 2024 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2024 msiexec.exe Token: SeLockMemoryPrivilege 2024 msiexec.exe Token: SeIncreaseQuotaPrivilege 2024 msiexec.exe Token: SeMachineAccountPrivilege 2024 msiexec.exe Token: SeTcbPrivilege 2024 msiexec.exe Token: SeSecurityPrivilege 2024 msiexec.exe Token: SeTakeOwnershipPrivilege 2024 msiexec.exe Token: SeLoadDriverPrivilege 2024 msiexec.exe Token: SeSystemProfilePrivilege 2024 msiexec.exe Token: SeSystemtimePrivilege 2024 msiexec.exe Token: SeProfSingleProcessPrivilege 2024 msiexec.exe Token: SeIncBasePriorityPrivilege 2024 msiexec.exe Token: SeCreatePagefilePrivilege 2024 msiexec.exe Token: SeCreatePermanentPrivilege 2024 msiexec.exe Token: SeBackupPrivilege 2024 msiexec.exe Token: SeRestorePrivilege 2024 msiexec.exe Token: SeShutdownPrivilege 2024 msiexec.exe Token: SeDebugPrivilege 2024 msiexec.exe Token: SeAuditPrivilege 2024 msiexec.exe Token: SeSystemEnvironmentPrivilege 2024 msiexec.exe Token: SeChangeNotifyPrivilege 2024 msiexec.exe Token: SeRemoteShutdownPrivilege 2024 msiexec.exe Token: SeUndockPrivilege 2024 msiexec.exe Token: SeSyncAgentPrivilege 2024 msiexec.exe Token: SeEnableDelegationPrivilege 2024 msiexec.exe Token: SeManageVolumePrivilege 2024 msiexec.exe Token: SeImpersonatePrivilege 2024 msiexec.exe Token: SeCreateGlobalPrivilege 2024 msiexec.exe Token: SeCreateTokenPrivilege 2024 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2024 msiexec.exe Token: SeLockMemoryPrivilege 2024 msiexec.exe Token: SeIncreaseQuotaPrivilege 2024 msiexec.exe Token: SeMachineAccountPrivilege 2024 msiexec.exe Token: SeTcbPrivilege 2024 msiexec.exe Token: SeSecurityPrivilege 2024 msiexec.exe Token: SeTakeOwnershipPrivilege 2024 msiexec.exe Token: SeLoadDriverPrivilege 2024 msiexec.exe Token: SeSystemProfilePrivilege 2024 msiexec.exe Token: SeSystemtimePrivilege 2024 msiexec.exe Token: SeProfSingleProcessPrivilege 2024 msiexec.exe Token: SeIncBasePriorityPrivilege 2024 msiexec.exe Token: SeCreatePagefilePrivilege 2024 msiexec.exe Token: SeCreatePermanentPrivilege 2024 msiexec.exe Token: SeBackupPrivilege 2024 msiexec.exe Token: SeRestorePrivilege 2024 msiexec.exe Token: SeShutdownPrivilege 2024 msiexec.exe Token: SeDebugPrivilege 2024 msiexec.exe Token: SeAuditPrivilege 2024 msiexec.exe Token: SeSystemEnvironmentPrivilege 2024 msiexec.exe Token: SeChangeNotifyPrivilege 2024 msiexec.exe Token: SeRemoteShutdownPrivilege 2024 msiexec.exe Token: SeUndockPrivilege 2024 msiexec.exe Token: SeSyncAgentPrivilege 2024 msiexec.exe Token: SeEnableDelegationPrivilege 2024 msiexec.exe Token: SeManageVolumePrivilege 2024 msiexec.exe Token: SeImpersonatePrivilege 2024 msiexec.exe Token: SeCreateGlobalPrivilege 2024 msiexec.exe Token: SeCreateTokenPrivilege 2024 msiexec.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2024 msiexec.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2080 wrote to memory of 1816 2080 msiexec.exe 29 PID 2080 wrote to memory of 1816 2080 msiexec.exe 29 PID 2080 wrote to memory of 1816 2080 msiexec.exe 29 PID 2080 wrote to memory of 1816 2080 msiexec.exe 29 PID 2080 wrote to memory of 1816 2080 msiexec.exe 29 PID 2080 wrote to memory of 1816 2080 msiexec.exe 29 PID 2080 wrote to memory of 1816 2080 msiexec.exe 29
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I "C:\Users\Admin\AppData\Local\Temp\Trojan.JS.Youareanidiot-main\Mostly Local\Idiot!_files\flashplayer32_0r0_371_winax.msi"1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2024
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding F324A0245E27FC38F83C07AD12B284A4 C2⤵
- Loads dropped DLL
PID:1816
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
141KB
MD5edb88affffd67bca3523b41d3e2e4810
SHA10055b93907665fed56d22a7614a581a87d060ead
SHA2564c3d85e7c49928af0f43623dcbed474a157ef50af3cba40b7fd7ac3fe3df2f15
SHA5122b9d99c57bfa9ab00d8582d55b18c5bf155a4ac83cf4c92247be23c35be818b082b3d6fe38fa905d304d2d8b957f3db73428da88e46acc3a7e3fee99d05e4daf
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf
-
Filesize
141KB
MD5edb88affffd67bca3523b41d3e2e4810
SHA10055b93907665fed56d22a7614a581a87d060ead
SHA2564c3d85e7c49928af0f43623dcbed474a157ef50af3cba40b7fd7ac3fe3df2f15
SHA5122b9d99c57bfa9ab00d8582d55b18c5bf155a4ac83cf4c92247be23c35be818b082b3d6fe38fa905d304d2d8b957f3db73428da88e46acc3a7e3fee99d05e4daf