Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28-02-2024 16:41
Static task
static1
Behavioral task
behavioral1
Sample
index.js
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
index.js
Resource
win10v2004-20240226-en
General
-
Target
index.js
-
Size
454KB
-
MD5
3d3ed73a201f7c66c142c03430b8ee84
-
SHA1
ae9a696dcbb5753600c0ccc8d747ae233cdaf875
-
SHA256
d7ce17fb525163501632c8fd9822ed57abbb0a7edcdca49dabfb676f21811062
-
SHA512
2ad3c1e0ae4871d6e05efed21918dffbb5dbeca08e34e51c0157f290e67a1501a1f679e246975ecee80fce809f38a4aff5a2ae1812d271ceb97db967460ea58f
-
SSDEEP
6144:cmkq6uYGAsZxAxR3n6slAgdEa9hv/kCyBxk:c66uYXsXkJ6sGCG2
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 2 1340 wscript.exe 6 1340 wscript.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 2236 WINWORD.EXE 2236 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 2236 WINWORD.EXE 2236 WINWORD.EXE 2236 WINWORD.EXE 2236 WINWORD.EXE 2236 WINWORD.EXE 2236 WINWORD.EXE 2236 WINWORD.EXE 2236 WINWORD.EXE 2236 WINWORD.EXE 2236 WINWORD.EXE 2236 WINWORD.EXE 2236 WINWORD.EXE 2236 WINWORD.EXE 2236 WINWORD.EXE
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\index.js1⤵
- Blocklisted process makes network request
PID:1340
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3944 --field-trial-handle=2280,i,11703952675008463361,17436195144517971517,262144 --variations-seed-version /prefetch:81⤵PID:1624
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4308
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Documents\These.docx" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2236
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
202B
MD54566d1d70073cd75fe35acb78ff9d082
SHA1f602ecc057a3c19aa07671b34b4fdd662aa033cc
SHA256fe33f57205e2ebb981c4744d5a4ddc231f587a9a0589e6565c52e1051eadb0c0
SHA512b9584ebfdd25cc588162dd6525a399c72ac03bf0c61709b96a19feba7217d840ae2c60d7b0d3b43307a2776f497a388e79ef8a646c12ae59a7f5cc4789bbf3c8
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD53f92a834ff152ba59a873cf1ba54a191
SHA14c45766c70206c8f8ee525f635b3e73ea988a75b
SHA256d1693badac8a01cb9f65815ccf9ace2a167ba66ed7421cf36fdd92cf51aef6f1
SHA512f376ca9073e1e3b817d7e3f114ca7950cdd82f09cea924527d4d92622351e16772125e7496ff11d13dbd753d4c01dfa4e54933684da743e283949ca65297c312
-
Filesize
11KB
MD550c55b6db77723132a495817de796e24
SHA160451f8451954abcca2761977fd9af82c65afa08
SHA25658d5b7378e3fce9fe56f9f29b9dc4fb6cdf035136077bd224323f8835b266dcc
SHA512c7daf8858a650d2fabe4d778685ddc40cd5074c1ca6c93d6ecbbc45c99cc5397ba3fd44b3c9eb213ff706f6ef5ec41612db84c23fa056a9c713ad8eb1367e315