Analysis

  • max time kernel
    143s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-02-2024 16:41

General

  • Target

    index.js

  • Size

    454KB

  • MD5

    3d3ed73a201f7c66c142c03430b8ee84

  • SHA1

    ae9a696dcbb5753600c0ccc8d747ae233cdaf875

  • SHA256

    d7ce17fb525163501632c8fd9822ed57abbb0a7edcdca49dabfb676f21811062

  • SHA512

    2ad3c1e0ae4871d6e05efed21918dffbb5dbeca08e34e51c0157f290e67a1501a1f679e246975ecee80fce809f38a4aff5a2ae1812d271ceb97db967460ea58f

  • SSDEEP

    6144:cmkq6uYGAsZxAxR3n6slAgdEa9hv/kCyBxk:c66uYXsXkJ6sGCG2

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\index.js
    1⤵
    • Blocklisted process makes network request
    PID:1340
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3944 --field-trial-handle=2280,i,11703952675008463361,17436195144517971517,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:1624
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:4308
      • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
        "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Documents\These.docx" /o ""
        1⤵
        • Checks processor information in registry
        • Enumerates system info in registry
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of SetWindowsHookEx
        PID:2236

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

        Filesize

        202B

        MD5

        4566d1d70073cd75fe35acb78ff9d082

        SHA1

        f602ecc057a3c19aa07671b34b4fdd662aa033cc

        SHA256

        fe33f57205e2ebb981c4744d5a4ddc231f587a9a0589e6565c52e1051eadb0c0

        SHA512

        b9584ebfdd25cc588162dd6525a399c72ac03bf0c61709b96a19feba7217d840ae2c60d7b0d3b43307a2776f497a388e79ef8a646c12ae59a7f5cc4789bbf3c8

      • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex

        Filesize

        2B

        MD5

        f3b25701fe362ec84616a93a45ce9998

        SHA1

        d62636d8caec13f04e28442a0a6fa1afeb024bbb

        SHA256

        b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

        SHA512

        98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

        Filesize

        3KB

        MD5

        3f92a834ff152ba59a873cf1ba54a191

        SHA1

        4c45766c70206c8f8ee525f635b3e73ea988a75b

        SHA256

        d1693badac8a01cb9f65815ccf9ace2a167ba66ed7421cf36fdd92cf51aef6f1

        SHA512

        f376ca9073e1e3b817d7e3f114ca7950cdd82f09cea924527d4d92622351e16772125e7496ff11d13dbd753d4c01dfa4e54933684da743e283949ca65297c312

      • C:\Users\Admin\Documents\~WRD0000.tmp

        Filesize

        11KB

        MD5

        50c55b6db77723132a495817de796e24

        SHA1

        60451f8451954abcca2761977fd9af82c65afa08

        SHA256

        58d5b7378e3fce9fe56f9f29b9dc4fb6cdf035136077bd224323f8835b266dcc

        SHA512

        c7daf8858a650d2fabe4d778685ddc40cd5074c1ca6c93d6ecbbc45c99cc5397ba3fd44b3c9eb213ff706f6ef5ec41612db84c23fa056a9c713ad8eb1367e315

      • memory/2236-15-0x00007FFE8D4D0000-0x00007FFE8D6C5000-memory.dmp

        Filesize

        2.0MB

      • memory/2236-58-0x00007FFE8D4D0000-0x00007FFE8D6C5000-memory.dmp

        Filesize

        2.0MB

      • memory/2236-14-0x00007FFE4D550000-0x00007FFE4D560000-memory.dmp

        Filesize

        64KB

      • memory/2236-8-0x00007FFE4D550000-0x00007FFE4D560000-memory.dmp

        Filesize

        64KB

      • memory/2236-16-0x00007FFE8D4D0000-0x00007FFE8D6C5000-memory.dmp

        Filesize

        2.0MB

      • memory/2236-17-0x00007FFE4ACF0000-0x00007FFE4AD00000-memory.dmp

        Filesize

        64KB

      • memory/2236-18-0x00007FFE4ACF0000-0x00007FFE4AD00000-memory.dmp

        Filesize

        64KB

      • memory/2236-10-0x00007FFE4D550000-0x00007FFE4D560000-memory.dmp

        Filesize

        64KB

      • memory/2236-12-0x00007FFE8D4D0000-0x00007FFE8D6C5000-memory.dmp

        Filesize

        2.0MB

      • memory/2236-49-0x00007FFE8D4D0000-0x00007FFE8D6C5000-memory.dmp

        Filesize

        2.0MB

      • memory/2236-9-0x00007FFE4D550000-0x00007FFE4D560000-memory.dmp

        Filesize

        64KB

      • memory/2236-56-0x00007FFE8D4D0000-0x00007FFE8D6C5000-memory.dmp

        Filesize

        2.0MB

      • memory/2236-57-0x00007FFE8D4D0000-0x00007FFE8D6C5000-memory.dmp

        Filesize

        2.0MB

      • memory/2236-13-0x00007FFE4D550000-0x00007FFE4D560000-memory.dmp

        Filesize

        64KB

      • memory/2236-59-0x00007FFE8D4D0000-0x00007FFE8D6C5000-memory.dmp

        Filesize

        2.0MB

      • memory/2236-61-0x00007FFE8D4D0000-0x00007FFE8D6C5000-memory.dmp

        Filesize

        2.0MB

      • memory/2236-60-0x00007FFE8D4D0000-0x00007FFE8D6C5000-memory.dmp

        Filesize

        2.0MB

      • memory/2236-62-0x00007FFE8D4D0000-0x00007FFE8D6C5000-memory.dmp

        Filesize

        2.0MB

      • memory/2236-63-0x00007FFE8D4D0000-0x00007FFE8D6C5000-memory.dmp

        Filesize

        2.0MB

      • memory/2236-11-0x00007FFE8D4D0000-0x00007FFE8D6C5000-memory.dmp

        Filesize

        2.0MB

      • memory/2236-146-0x00007FFE4D550000-0x00007FFE4D560000-memory.dmp

        Filesize

        64KB

      • memory/2236-147-0x00007FFE4D550000-0x00007FFE4D560000-memory.dmp

        Filesize

        64KB

      • memory/2236-148-0x00007FFE4D550000-0x00007FFE4D560000-memory.dmp

        Filesize

        64KB

      • memory/2236-149-0x00007FFE4D550000-0x00007FFE4D560000-memory.dmp

        Filesize

        64KB

      • memory/2236-150-0x00007FFE8D4D0000-0x00007FFE8D6C5000-memory.dmp

        Filesize

        2.0MB

      • memory/2236-151-0x00007FFE8D4D0000-0x00007FFE8D6C5000-memory.dmp

        Filesize

        2.0MB