Overview
overview
7Static
static
1Trojan.JS....!.html
windows7-x64
1Trojan.JS....!.html
windows10-2004-x64
1Trojan.JS....ax.msi
windows7-x64
7Trojan.JS....ax.msi
windows10-2004-x64
7Trojan.JS....ot.png
windows7-x64
1Trojan.JS....ot.png
windows10-2004-x64
3Trojan.JS....sh.cab
windows7-x64
1Trojan.JS....sh.cab
windows10-2004-x64
1FP_AX_CAB_...64.exe
windows7-x64
3FP_AX_CAB_...64.exe
windows10-2004-x64
5swflash64.inf
windows7-x64
1swflash64.inf
windows10-2004-x64
1Trojan.JS....you.js
windows7-x64
1Trojan.JS....you.js
windows10-2004-x64
1Trojan.JS....l.html
windows7-x64
1Trojan.JS....l.html
windows10-2004-x64
1Trojan.JS....ax.msi
windows7-x64
7Trojan.JS....ax.msi
windows10-2004-x64
7Trojan.JS....sh.cab
windows7-x64
1Trojan.JS....sh.cab
windows10-2004-x64
1Trojan.JS....you.js
windows7-x64
1Trojan.JS....you.js
windows10-2004-x64
1Trojan.JS....!.html
windows7-x64
1Trojan.JS....!.html
windows10-2004-x64
1Trojan.JS....you.js
windows7-x64
1Trojan.JS....you.js
windows10-2004-x64
1Trojan.JS....l.html
windows7-x64
1Trojan.JS....l.html
windows10-2004-x64
1Trojan.JS....you.js
windows7-x64
1Trojan.JS....you.js
windows10-2004-x64
1Analysis
-
max time kernel
114s -
max time network
200s -
platform
windows10-2004_x64 -
resource
win10v2004-20231025-en -
resource tags
arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system -
submitted
05/11/2023, 15:57
Static task
static1
Behavioral task
behavioral1
Sample
Trojan.JS.Youareanidiot-main/Mostly Local/Idiot!.html
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
Trojan.JS.Youareanidiot-main/Mostly Local/Idiot!.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral3
Sample
Trojan.JS.Youareanidiot-main/Mostly Local/Idiot!_files/flashplayer32_0r0_371_winax.msi
Resource
win7-20231020-en
Behavioral task
behavioral4
Sample
Trojan.JS.Youareanidiot-main/Mostly Local/Idiot!_files/flashplayer32_0r0_371_winax.msi
Resource
win10v2004-20231025-en
Behavioral task
behavioral5
Sample
Trojan.JS.Youareanidiot-main/Mostly Local/Idiot!_files/idiot.png
Resource
win7-20231023-en
Behavioral task
behavioral6
Sample
Trojan.JS.Youareanidiot-main/Mostly Local/Idiot!_files/idiot.png
Resource
win10v2004-20231023-en
Behavioral task
behavioral7
Sample
Trojan.JS.Youareanidiot-main/Mostly Local/Idiot!_files/swflash.cab
Resource
win7-20231023-en
Behavioral task
behavioral8
Sample
Trojan.JS.Youareanidiot-main/Mostly Local/Idiot!_files/swflash.cab
Resource
win10v2004-20231020-en
Behavioral task
behavioral9
Sample
FP_AX_CAB_INSTALLER64.exe
Resource
win7-20231020-en
Behavioral task
behavioral10
Sample
FP_AX_CAB_INSTALLER64.exe
Resource
win10v2004-20231025-en
Behavioral task
behavioral11
Sample
swflash64.inf
Resource
win7-20231020-en
Behavioral task
behavioral12
Sample
swflash64.inf
Resource
win10v2004-20231023-en
Behavioral task
behavioral13
Sample
Trojan.JS.Youareanidiot-main/Mostly Local/Idiot!_files/you.js
Resource
win7-20231023-en
Behavioral task
behavioral14
Sample
Trojan.JS.Youareanidiot-main/Mostly Local/Idiot!_files/you.js
Resource
win10v2004-20231023-en
Behavioral task
behavioral15
Sample
Trojan.JS.Youareanidiot-main/Mostly Local/lol.html
Resource
win7-20231023-en
Behavioral task
behavioral16
Sample
Trojan.JS.Youareanidiot-main/Mostly Local/lol.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral17
Sample
Trojan.JS.Youareanidiot-main/Mostly Local/lol_files/flashplayer32_0r0_371_winax.msi
Resource
win7-20231020-en
Behavioral task
behavioral18
Sample
Trojan.JS.Youareanidiot-main/Mostly Local/lol_files/flashplayer32_0r0_371_winax.msi
Resource
win10v2004-20231025-en
Behavioral task
behavioral19
Sample
Trojan.JS.Youareanidiot-main/Mostly Local/lol_files/swflash.cab
Resource
win7-20231020-en
Behavioral task
behavioral20
Sample
Trojan.JS.Youareanidiot-main/Mostly Local/lol_files/swflash.cab
Resource
win10v2004-20231023-en
Behavioral task
behavioral21
Sample
Trojan.JS.Youareanidiot-main/Mostly Local/lol_files/you.js
Resource
win7-20231023-en
Behavioral task
behavioral22
Sample
Trojan.JS.Youareanidiot-main/Mostly Local/lol_files/you.js
Resource
win10v2004-20231023-en
Behavioral task
behavioral23
Sample
Trojan.JS.Youareanidiot-main/Mostly Online/Idiot!.html
Resource
win7-20231023-en
Behavioral task
behavioral24
Sample
Trojan.JS.Youareanidiot-main/Mostly Online/Idiot!.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral25
Sample
Trojan.JS.Youareanidiot-main/Mostly Online/Idiot!_files/you.js
Resource
win7-20231025-en
Behavioral task
behavioral26
Sample
Trojan.JS.Youareanidiot-main/Mostly Online/Idiot!_files/you.js
Resource
win10v2004-20231020-en
Behavioral task
behavioral27
Sample
Trojan.JS.Youareanidiot-main/Mostly Online/lol.html
Resource
win7-20231020-en
Behavioral task
behavioral28
Sample
Trojan.JS.Youareanidiot-main/Mostly Online/lol.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral29
Sample
Trojan.JS.Youareanidiot-main/Mostly Online/lol_files/you.js
Resource
win7-20231023-en
Behavioral task
behavioral30
Sample
Trojan.JS.Youareanidiot-main/Mostly Online/lol_files/you.js
Resource
win10v2004-20231023-en
General
-
Target
Trojan.JS.Youareanidiot-main/Mostly Local/Idiot!_files/flashplayer32_0r0_371_winax.msi
-
Size
20.9MB
-
MD5
ee8a1e16c9c520929c565ea7c97b3189
-
SHA1
77fe833fb091475fd4cff01135273731c64d04c5
-
SHA256
06adb72a820e100c2ce2bf65605bebf835fbd0447b882a9ed6e99a340ba0f843
-
SHA512
c480be9096a4f4f384705f0e91dc3887ce507fd5670e64f571f8abcb079cdbdd07b85b9a1576cc97bb482adb6b8f12f33a5b0e17f1a27860b4321a1d673c614b
-
SSDEEP
393216:mktMY5dmLqNyGgUVuXb9eDjtUj7gNZyQLfrtjJ1b9Rd9vwRQYiPzDaOg:PfmewkuXpYsykSjJFb0RQbft
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 4760 MsiExec.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 38 2448 msiexec.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\T: msiexec.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2448 msiexec.exe Token: SeIncreaseQuotaPrivilege 2448 msiexec.exe Token: SeSecurityPrivilege 3136 msiexec.exe Token: SeCreateTokenPrivilege 2448 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2448 msiexec.exe Token: SeLockMemoryPrivilege 2448 msiexec.exe Token: SeIncreaseQuotaPrivilege 2448 msiexec.exe Token: SeMachineAccountPrivilege 2448 msiexec.exe Token: SeTcbPrivilege 2448 msiexec.exe Token: SeSecurityPrivilege 2448 msiexec.exe Token: SeTakeOwnershipPrivilege 2448 msiexec.exe Token: SeLoadDriverPrivilege 2448 msiexec.exe Token: SeSystemProfilePrivilege 2448 msiexec.exe Token: SeSystemtimePrivilege 2448 msiexec.exe Token: SeProfSingleProcessPrivilege 2448 msiexec.exe Token: SeIncBasePriorityPrivilege 2448 msiexec.exe Token: SeCreatePagefilePrivilege 2448 msiexec.exe Token: SeCreatePermanentPrivilege 2448 msiexec.exe Token: SeBackupPrivilege 2448 msiexec.exe Token: SeRestorePrivilege 2448 msiexec.exe Token: SeShutdownPrivilege 2448 msiexec.exe Token: SeDebugPrivilege 2448 msiexec.exe Token: SeAuditPrivilege 2448 msiexec.exe Token: SeSystemEnvironmentPrivilege 2448 msiexec.exe Token: SeChangeNotifyPrivilege 2448 msiexec.exe Token: SeRemoteShutdownPrivilege 2448 msiexec.exe Token: SeUndockPrivilege 2448 msiexec.exe Token: SeSyncAgentPrivilege 2448 msiexec.exe Token: SeEnableDelegationPrivilege 2448 msiexec.exe Token: SeManageVolumePrivilege 2448 msiexec.exe Token: SeImpersonatePrivilege 2448 msiexec.exe Token: SeCreateGlobalPrivilege 2448 msiexec.exe Token: SeCreateTokenPrivilege 2448 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2448 msiexec.exe Token: SeLockMemoryPrivilege 2448 msiexec.exe Token: SeIncreaseQuotaPrivilege 2448 msiexec.exe Token: SeMachineAccountPrivilege 2448 msiexec.exe Token: SeTcbPrivilege 2448 msiexec.exe Token: SeSecurityPrivilege 2448 msiexec.exe Token: SeTakeOwnershipPrivilege 2448 msiexec.exe Token: SeLoadDriverPrivilege 2448 msiexec.exe Token: SeSystemProfilePrivilege 2448 msiexec.exe Token: SeSystemtimePrivilege 2448 msiexec.exe Token: SeProfSingleProcessPrivilege 2448 msiexec.exe Token: SeIncBasePriorityPrivilege 2448 msiexec.exe Token: SeCreatePagefilePrivilege 2448 msiexec.exe Token: SeCreatePermanentPrivilege 2448 msiexec.exe Token: SeBackupPrivilege 2448 msiexec.exe Token: SeRestorePrivilege 2448 msiexec.exe Token: SeShutdownPrivilege 2448 msiexec.exe Token: SeDebugPrivilege 2448 msiexec.exe Token: SeAuditPrivilege 2448 msiexec.exe Token: SeSystemEnvironmentPrivilege 2448 msiexec.exe Token: SeChangeNotifyPrivilege 2448 msiexec.exe Token: SeRemoteShutdownPrivilege 2448 msiexec.exe Token: SeUndockPrivilege 2448 msiexec.exe Token: SeSyncAgentPrivilege 2448 msiexec.exe Token: SeEnableDelegationPrivilege 2448 msiexec.exe Token: SeManageVolumePrivilege 2448 msiexec.exe Token: SeImpersonatePrivilege 2448 msiexec.exe Token: SeCreateGlobalPrivilege 2448 msiexec.exe Token: SeCreateTokenPrivilege 2448 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2448 msiexec.exe Token: SeLockMemoryPrivilege 2448 msiexec.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2448 msiexec.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3136 wrote to memory of 4760 3136 msiexec.exe 92 PID 3136 wrote to memory of 4760 3136 msiexec.exe 92 PID 3136 wrote to memory of 4760 3136 msiexec.exe 92
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I "C:\Users\Admin\AppData\Local\Temp\Trojan.JS.Youareanidiot-main\Mostly Local\Idiot!_files\flashplayer32_0r0_371_winax.msi"1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2448
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3136 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 594BBE39A47FECF4A0AFA115EE821A85 C2⤵
- Loads dropped DLL
PID:4760
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
141KB
MD5edb88affffd67bca3523b41d3e2e4810
SHA10055b93907665fed56d22a7614a581a87d060ead
SHA2564c3d85e7c49928af0f43623dcbed474a157ef50af3cba40b7fd7ac3fe3df2f15
SHA5122b9d99c57bfa9ab00d8582d55b18c5bf155a4ac83cf4c92247be23c35be818b082b3d6fe38fa905d304d2d8b957f3db73428da88e46acc3a7e3fee99d05e4daf
-
Filesize
141KB
MD5edb88affffd67bca3523b41d3e2e4810
SHA10055b93907665fed56d22a7614a581a87d060ead
SHA2564c3d85e7c49928af0f43623dcbed474a157ef50af3cba40b7fd7ac3fe3df2f15
SHA5122b9d99c57bfa9ab00d8582d55b18c5bf155a4ac83cf4c92247be23c35be818b082b3d6fe38fa905d304d2d8b957f3db73428da88e46acc3a7e3fee99d05e4daf