Analysis

  • max time kernel
    192s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    17/11/2023, 21:03

General

  • Target

    TypeScript-5.2.2/tests/projects/resolveJsonModuleAndComposite/tsconfig_withIncludeAndFiles.json

  • Size

    341B

  • MD5

    b673c6172be8f34a2bb93463f42224c3

  • SHA1

    799727de74d83a98befb624ae958306153318671

  • SHA256

    627bb6c93f2df37b6e7f90e75a07a2b81666dd77529c1de3ec1eb7f6958dbabc

  • SHA512

    1d6d315d05c9fea680589194685c98d86bab59aa9d0cc8f96cc1b801bdc2a1c3c2a6553211b79e6a4f2c852dc529a269a60468ff23cece9832602d30e61c5642

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\TypeScript-5.2.2\tests\projects\resolveJsonModuleAndComposite\tsconfig_withIncludeAndFiles.json
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2600
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\TypeScript-5.2.2\tests\projects\resolveJsonModuleAndComposite\tsconfig_withIncludeAndFiles.json
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1388
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\TypeScript-5.2.2\tests\projects\resolveJsonModuleAndComposite\tsconfig_withIncludeAndFiles.json"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:1692

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

          Filesize

          3KB

          MD5

          9c3f5511d89623789c6d37134a6f0868

          SHA1

          70ddad453e0842879a60f4d84086048183657a9f

          SHA256

          63504ae01fb9fe40e272e30f20d5b034d37761bd1b6b49d9568b68bdd235f716

          SHA512

          9aadfafb422f858ce1e3e2606e738a36a41cac578b013f954dfe3421ac5dfaeb1b5e4c6a04598e759b080b478d82fa27a9080b995a6390ab2da210ec4bc1266a