Resubmissions

10/12/2023, 16:46

231210-vabhkahga2 3

10/12/2023, 16:43

231210-t8k9zshfe4 3

Analysis

  • max time kernel
    144s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231130-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231130-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/12/2023, 16:46

General

  • Target

    Pirate-Stealer-main/src/injection/injection-minified.js

  • Size

    16KB

  • MD5

    b685ffb90c12e34bd495687d4f926beb

  • SHA1

    86354a49b2ae648169532c6674f070b5529699fe

  • SHA256

    cfdcbe1f2a95ef17c340fc555d851e3383989b8ad944984f011ec11127d6ab01

  • SHA512

    3bd2d97b7de39fb79d98948cafb6b23759acbe5ac4710679be59fc476e1752afdf1d16b68a3bf76b713fa88df9f1488d77c3cb4a4e4765bd1ca744304aa1ac3e

  • SSDEEP

    384:ULse1hL18lLxXhO6e6HO6q62O6e6hfJU5JHaUTZ5xxqGSVMYQwYw8fS7/:UZ14xXY6e6u6q6R6e69JWJHaUTZTxqG2

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\Pirate-Stealer-main\src\injection\injection-minified.js
    1⤵
      PID:4324
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
      1⤵
        PID:3772
      • C:\Windows\System32\svchost.exe
        C:\Windows\System32\svchost.exe -k UnistackSvcGroup
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:984

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/984-0-0x000002395A040000-0x000002395A050000-memory.dmp

        Filesize

        64KB

      • memory/984-16-0x000002395A140000-0x000002395A150000-memory.dmp

        Filesize

        64KB

      • memory/984-32-0x00000239626D0000-0x00000239626D1000-memory.dmp

        Filesize

        4KB

      • memory/984-33-0x0000023962700000-0x0000023962701000-memory.dmp

        Filesize

        4KB

      • memory/984-34-0x0000023962700000-0x0000023962701000-memory.dmp

        Filesize

        4KB

      • memory/984-35-0x0000023962700000-0x0000023962701000-memory.dmp

        Filesize

        4KB

      • memory/984-36-0x0000023962700000-0x0000023962701000-memory.dmp

        Filesize

        4KB

      • memory/984-39-0x0000023962700000-0x0000023962701000-memory.dmp

        Filesize

        4KB

      • memory/984-41-0x0000023962700000-0x0000023962701000-memory.dmp

        Filesize

        4KB

      • memory/984-40-0x0000023962700000-0x0000023962701000-memory.dmp

        Filesize

        4KB

      • memory/984-38-0x0000023962700000-0x0000023962701000-memory.dmp

        Filesize

        4KB

      • memory/984-42-0x0000023962700000-0x0000023962701000-memory.dmp

        Filesize

        4KB

      • memory/984-37-0x0000023962700000-0x0000023962701000-memory.dmp

        Filesize

        4KB

      • memory/984-44-0x0000023962310000-0x0000023962311000-memory.dmp

        Filesize

        4KB

      • memory/984-43-0x0000023962320000-0x0000023962321000-memory.dmp

        Filesize

        4KB

      • memory/984-49-0x0000023962310000-0x0000023962311000-memory.dmp

        Filesize

        4KB

      • memory/984-46-0x0000023962320000-0x0000023962321000-memory.dmp

        Filesize

        4KB

      • memory/984-64-0x0000023962450000-0x0000023962451000-memory.dmp

        Filesize

        4KB

      • memory/984-52-0x0000023962250000-0x0000023962251000-memory.dmp

        Filesize

        4KB

      • memory/984-66-0x0000023962460000-0x0000023962461000-memory.dmp

        Filesize

        4KB

      • memory/984-68-0x0000023962570000-0x0000023962571000-memory.dmp

        Filesize

        4KB

      • memory/984-67-0x0000023962460000-0x0000023962461000-memory.dmp

        Filesize

        4KB