Analysis

  • max time kernel
    143s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231025-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/11/2023, 22:00

General

  • Target

    slardar_sdk.js

  • Size

    51KB

  • MD5

    adc5dbfdfc9c87ce72f6f73f1809fd7b

  • SHA1

    3b4233e9e367096cca64ba489172329af9887c4c

  • SHA256

    5ca3eec94dec06c18431512cbcdcf3d920ce25cbc2774b498f8a1f41d1216027

  • SHA512

    55e0a7f94f9e7816722b4cfa91f395bf5e418274f0a06b696dbd237f95e45e6da271fd10df21981548dec0fe008c23850eeeeace7752aad2a528dff740c1526b

  • SSDEEP

    768:x8Z9bbDO4P6/JkK3eqB/jYYzVpKmeu8E3B/6d0:xOW/mK3/jY2

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\slardar_sdk.js
    1⤵
      PID:4456
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
      1⤵
        PID:2620
      • C:\Windows\System32\svchost.exe
        C:\Windows\System32\svchost.exe -k UnistackSvcGroup
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1616

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1616-0-0x00000235EF340000-0x00000235EF350000-memory.dmp

        Filesize

        64KB

      • memory/1616-16-0x00000235EF440000-0x00000235EF450000-memory.dmp

        Filesize

        64KB

      • memory/1616-32-0x00000235F7A20000-0x00000235F7A21000-memory.dmp

        Filesize

        4KB

      • memory/1616-33-0x00000235F7A30000-0x00000235F7A31000-memory.dmp

        Filesize

        4KB

      • memory/1616-34-0x00000235F7A30000-0x00000235F7A31000-memory.dmp

        Filesize

        4KB

      • memory/1616-35-0x00000235F7A30000-0x00000235F7A31000-memory.dmp

        Filesize

        4KB

      • memory/1616-36-0x00000235F7A30000-0x00000235F7A31000-memory.dmp

        Filesize

        4KB

      • memory/1616-37-0x00000235F7A30000-0x00000235F7A31000-memory.dmp

        Filesize

        4KB

      • memory/1616-38-0x00000235F7A30000-0x00000235F7A31000-memory.dmp

        Filesize

        4KB

      • memory/1616-39-0x00000235F7A30000-0x00000235F7A31000-memory.dmp

        Filesize

        4KB

      • memory/1616-40-0x00000235F7A40000-0x00000235F7A41000-memory.dmp

        Filesize

        4KB

      • memory/1616-41-0x00000235F7A40000-0x00000235F7A41000-memory.dmp

        Filesize

        4KB

      • memory/1616-42-0x00000235F7A40000-0x00000235F7A41000-memory.dmp

        Filesize

        4KB

      • memory/1616-43-0x00000235F7670000-0x00000235F7671000-memory.dmp

        Filesize

        4KB

      • memory/1616-44-0x00000235F7660000-0x00000235F7661000-memory.dmp

        Filesize

        4KB

      • memory/1616-46-0x00000235F7670000-0x00000235F7671000-memory.dmp

        Filesize

        4KB

      • memory/1616-49-0x00000235F7660000-0x00000235F7661000-memory.dmp

        Filesize

        4KB

      • memory/1616-52-0x00000235F75A0000-0x00000235F75A1000-memory.dmp

        Filesize

        4KB

      • memory/1616-64-0x00000235F77A0000-0x00000235F77A1000-memory.dmp

        Filesize

        4KB

      • memory/1616-66-0x00000235F77B0000-0x00000235F77B1000-memory.dmp

        Filesize

        4KB

      • memory/1616-67-0x00000235F77B0000-0x00000235F77B1000-memory.dmp

        Filesize

        4KB

      • memory/1616-68-0x00000235F78C0000-0x00000235F78C1000-memory.dmp

        Filesize

        4KB