Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    02-05-2024 06:27

General

  • Target

    jodit-react-main/.npmrc

  • Size

    100B

  • MD5

    c02e8d8c357f348040a5c51d54bd1d19

  • SHA1

    88ae39aab5f71889c61aee928aa50557e3d7fa80

  • SHA256

    01c86156125f474401f8cfac1312df9d0d39f39942779f225d6bf556d2e1690d

  • SHA512

    483150f9a7051d28f5fae0b1099d1b37435b929971b24a31a2643d4d47427842a347cd8b21da193691f72106c09d4fd6b56107f0e98aedd077e6f7efbef875a2

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\jodit-react-main\.npmrc
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2848
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\jodit-react-main\.npmrc
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2752
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\jodit-react-main\.npmrc"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2580

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    63437ec5f2f0fee74294c08c86ef28fd

    SHA1

    4703acce83e3dea243bbc383e1a2e3931357a155

    SHA256

    89433143bcf346f63b3071ee43e775291efebec075bba40bb1479d561b7886f4

    SHA512

    962be03036588a60496e3a3616af9e71892ab6e653bc3310506afb2e6d29a350aceab9f66f2dbe0adeee489cb2b60c07c9c2f260ac86a50e4dbd062de286d0df