Analysis

  • max time kernel
    144s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/01/2024, 23:57

General

  • Target

    63f29df9ce5813c353764da666cec824.js

  • Size

    11KB

  • MD5

    63f29df9ce5813c353764da666cec824

  • SHA1

    51e3fb544be30762251f75a586127199096dc822

  • SHA256

    742f8935010d1c67f95c43c0a8935ee61449eae9710c370046dae47ed62db08e

  • SHA512

    25fb1bc18af000c85c24afdbf220277f93f9392cddb4e76f44723ad92be83179db015ced8cd0d62acd22028eb08b1c46306e363bc603e572f916d51e5d63cbd6

  • SSDEEP

    192:koznF39+PHBF5XlXQXQXtqvXwXcXsIBh6Mazs4TLPAuz68X8MXo+07o:Tzahr1AgdGgs8jMaztTLPAuz68MMv07o

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\63f29df9ce5813c353764da666cec824.js
    1⤵
      PID:1084
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
      1⤵
        PID:4428
      • C:\Windows\System32\svchost.exe
        C:\Windows\System32\svchost.exe -k UnistackSvcGroup
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3008

      Network

            MITRE ATT&CK Matrix

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/3008-0-0x000001E5D0340000-0x000001E5D0350000-memory.dmp

              Filesize

              64KB

            • memory/3008-16-0x000001E5D0440000-0x000001E5D0450000-memory.dmp

              Filesize

              64KB

            • memory/3008-32-0x000001E5D8790000-0x000001E5D8791000-memory.dmp

              Filesize

              4KB

            • memory/3008-36-0x000001E5D88D0000-0x000001E5D88D1000-memory.dmp

              Filesize

              4KB

            • memory/3008-35-0x000001E5D87C0000-0x000001E5D87C1000-memory.dmp

              Filesize

              4KB

            • memory/3008-34-0x000001E5D87C0000-0x000001E5D87C1000-memory.dmp

              Filesize

              4KB