Analysis
-
max time kernel
85s -
max time network
92s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2024 15:26
Behavioral task
behavioral1
Sample
Program.js
Resource
win7-20240221-en
windows7-x64
1 signatures
300 seconds
Behavioral task
behavioral2
Sample
Program.js
Resource
win10v2004-20240226-en
windows10-2004-x64
6 signatures
300 seconds
General
-
Target
Program.js
-
Size
47KB
-
MD5
984be5b38504e2d7d8909c29c76bdf52
-
SHA1
6b34a99c874cf54e22d3dd3004567e7298911c74
-
SHA256
5d70f8cd423aa75c5ac8e93b047fd6816663e68520f7f1ba2b68567a2cec5161
-
SHA512
cec02989741f4f7296fe441d524e8d57f2cdb74668193c9d113bc042b737360d4f131196bc675a459ad0f9aa787dbe36ba5a175d4dcf7cf21be95e525ad012ba
-
SSDEEP
768:+qYgMLC9Zp4Eznii6d1Vnln+k60hIOBkreyMKB/wH:EmZii6PVnd/nB2UH
Score
3/10
Malware Config
Signatures
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1012 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1012 vlc.exe -
Suspicious use of FindShellTrayWindow 11 IoCs
pid Process 1012 vlc.exe 1012 vlc.exe 1012 vlc.exe 1012 vlc.exe 1012 vlc.exe 1012 vlc.exe 1012 vlc.exe 1012 vlc.exe 1012 vlc.exe 1012 vlc.exe 1012 vlc.exe -
Suspicious use of SendNotifyMessage 10 IoCs
pid Process 1012 vlc.exe 1012 vlc.exe 1012 vlc.exe 1012 vlc.exe 1012 vlc.exe 1012 vlc.exe 1012 vlc.exe 1012 vlc.exe 1012 vlc.exe 1012 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1012 vlc.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\Program.js1⤵PID:4656
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\CompressMeasure.wma"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1012
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4040
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3700 --field-trial-handle=2252,i,16022092570067181109,3235558581947505669,262144 --variations-seed-version /prefetch:81⤵PID:4300