Analysis
-
max time kernel
55s -
max time network
57s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
20/05/2024, 10:05
Static task
static1
Behavioral task
behavioral1
Sample
sample.js
Resource
win11-20240426-en
Errors
General
-
Target
sample.js
-
Size
17KB
-
MD5
ee9bd4405b5a92a7b635e64b050a33f3
-
SHA1
30785a7af8d250a4138aebee945d4776a1e525df
-
SHA256
217dec5d0b839effaca78e88c1e72807e50aaffb7b1506c5b89f80158c8c4234
-
SHA512
0c6c601ed0e5ce18be47f0541db0fde752e93edc0d41367a1e7aba15b62a336c37095f5bb817bd596b492280f6b332dacf633ddb5c6cc1bb8d11c3f03dac06f3
-
SSDEEP
192:rOqxB6WbR9W1P+uTRQQZs3ntnMCCNTZ5gkS8uyqkCEO8fktp8S6eTAt5gviM+Bji:rO23tM5NFS8uoZNoUd1Zs
Malware Config
Signatures
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365268" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = 99ebff004cc2ff000091f8000078d4000067c000003e9200001a6800f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292114432" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4290799360" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292114432" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365268" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "118" LogonUI.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1652 vlc.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3564 msedge.exe 3564 msedge.exe 32 msedge.exe 32 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1652 vlc.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 32 msedge.exe 32 msedge.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 1652 vlc.exe 1652 vlc.exe 1652 vlc.exe 1652 vlc.exe 1652 vlc.exe 1652 vlc.exe 1652 vlc.exe 1652 vlc.exe 1652 vlc.exe -
Suspicious use of SendNotifyMessage 20 IoCs
pid Process 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 1652 vlc.exe 1652 vlc.exe 1652 vlc.exe 1652 vlc.exe 1652 vlc.exe 1652 vlc.exe 1652 vlc.exe 1652 vlc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1652 vlc.exe 4620 LogonUI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 32 wrote to memory of 1080 32 msedge.exe 83 PID 32 wrote to memory of 1080 32 msedge.exe 83 PID 32 wrote to memory of 3024 32 msedge.exe 84 PID 32 wrote to memory of 3024 32 msedge.exe 84 PID 32 wrote to memory of 3024 32 msedge.exe 84 PID 32 wrote to memory of 3024 32 msedge.exe 84 PID 32 wrote to memory of 3024 32 msedge.exe 84 PID 32 wrote to memory of 3024 32 msedge.exe 84 PID 32 wrote to memory of 3024 32 msedge.exe 84 PID 32 wrote to memory of 3024 32 msedge.exe 84 PID 32 wrote to memory of 3024 32 msedge.exe 84 PID 32 wrote to memory of 3024 32 msedge.exe 84 PID 32 wrote to memory of 3024 32 msedge.exe 84 PID 32 wrote to memory of 3024 32 msedge.exe 84 PID 32 wrote to memory of 3024 32 msedge.exe 84 PID 32 wrote to memory of 3024 32 msedge.exe 84 PID 32 wrote to memory of 3024 32 msedge.exe 84 PID 32 wrote to memory of 3024 32 msedge.exe 84 PID 32 wrote to memory of 3024 32 msedge.exe 84 PID 32 wrote to memory of 3024 32 msedge.exe 84 PID 32 wrote to memory of 3024 32 msedge.exe 84 PID 32 wrote to memory of 3024 32 msedge.exe 84 PID 32 wrote to memory of 3024 32 msedge.exe 84 PID 32 wrote to memory of 3024 32 msedge.exe 84 PID 32 wrote to memory of 3024 32 msedge.exe 84 PID 32 wrote to memory of 3024 32 msedge.exe 84 PID 32 wrote to memory of 3024 32 msedge.exe 84 PID 32 wrote to memory of 3024 32 msedge.exe 84 PID 32 wrote to memory of 3024 32 msedge.exe 84 PID 32 wrote to memory of 3024 32 msedge.exe 84 PID 32 wrote to memory of 3024 32 msedge.exe 84 PID 32 wrote to memory of 3024 32 msedge.exe 84 PID 32 wrote to memory of 3024 32 msedge.exe 84 PID 32 wrote to memory of 3024 32 msedge.exe 84 PID 32 wrote to memory of 3024 32 msedge.exe 84 PID 32 wrote to memory of 3024 32 msedge.exe 84 PID 32 wrote to memory of 3024 32 msedge.exe 84 PID 32 wrote to memory of 3024 32 msedge.exe 84 PID 32 wrote to memory of 3024 32 msedge.exe 84 PID 32 wrote to memory of 3024 32 msedge.exe 84 PID 32 wrote to memory of 3024 32 msedge.exe 84 PID 32 wrote to memory of 3024 32 msedge.exe 84 PID 32 wrote to memory of 3564 32 msedge.exe 85 PID 32 wrote to memory of 3564 32 msedge.exe 85 PID 32 wrote to memory of 900 32 msedge.exe 86 PID 32 wrote to memory of 900 32 msedge.exe 86 PID 32 wrote to memory of 900 32 msedge.exe 86 PID 32 wrote to memory of 900 32 msedge.exe 86 PID 32 wrote to memory of 900 32 msedge.exe 86 PID 32 wrote to memory of 900 32 msedge.exe 86 PID 32 wrote to memory of 900 32 msedge.exe 86 PID 32 wrote to memory of 900 32 msedge.exe 86 PID 32 wrote to memory of 900 32 msedge.exe 86 PID 32 wrote to memory of 900 32 msedge.exe 86 PID 32 wrote to memory of 900 32 msedge.exe 86 PID 32 wrote to memory of 900 32 msedge.exe 86 PID 32 wrote to memory of 900 32 msedge.exe 86 PID 32 wrote to memory of 900 32 msedge.exe 86 PID 32 wrote to memory of 900 32 msedge.exe 86 PID 32 wrote to memory of 900 32 msedge.exe 86 PID 32 wrote to memory of 900 32 msedge.exe 86 PID 32 wrote to memory of 900 32 msedge.exe 86 PID 32 wrote to memory of 900 32 msedge.exe 86 PID 32 wrote to memory of 900 32 msedge.exe 86
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\sample.js1⤵PID:4264
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://java.com/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:32 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffbd71d3cb8,0x7ffbd71d3cc8,0x7ffbd71d3cd82⤵PID:1080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1908,1912465830724505460,3167941774245605579,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1876 /prefetch:22⤵PID:3024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1908,1912465830724505460,3167941774245605579,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2336 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1908,1912465830724505460,3167941774245605579,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2728 /prefetch:82⤵PID:900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,1912465830724505460,3167941774245605579,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:3548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,1912465830724505460,3167941774245605579,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:1708
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3524
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3140
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\InvokeGroup.M2V"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1652
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3a1b055 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:4620
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD55e027def9b55f3d49cde9fb82beba238
SHA164baabd8454c210162cbc3a90d6a2daaf87d856a
SHA2569816e980b04f1fe7efaa4b9c83ff6a0fdd485ee65a884c001b43a0cad7c39d83
SHA512a315e1336c5ec70cbb002969e539068ba92f3ec681b6d863db95227fd1808a778fd994e2fb03f28f0e401677aa5f7c66813e315b6b99a5065384c49586f9782e
-
Filesize
152B
MD50c5042350ee7871ccbfdc856bde96f3f
SHA190222f176bc96ec17d1bdad2d31bc994c000900c
SHA256b8b1cb139d4d19a85adce0152fa3c4f6adfb73a322d7253820e848c6f82afc1b
SHA5122efdb535fa6a06c4f9702b2129f2dd07c330e37fd10b492f2236007c660c1707773c22005d1e1fa580dbf633dc1a700ada3b7b611ef9accd9555a17a244f61ce
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize480B
MD577fbe1b3ef3847e47bd59b5ffa5e02a5
SHA1330bf2fdc85c34a66586967d2125c0a5bad8c8b9
SHA256d24ab6006e4bf52ae660f6e8c91759438d13e7e30db0a3a15f90c1ccb9129d40
SHA51242ff07f08748b23b7d01f099c3cdd4a854613b90231aaf742f40dde312caf56474580c7546f628a11c718e76dd428bbebe20d05049646ef5c81f5a620a6fd62a
-
Filesize
408B
MD534499fdb770abc1abc0f66bd00ddace9
SHA11dda4182024016adf2894ea65581281fcc7640fa
SHA25647c68a92bcf22f29197cced99e4ea19cac8d3fca7e5b9d1cad501928d0a40d86
SHA512236dbb189da59d4c9a4543f2a0070a3434919060773d73d2fb3b2b6cdee4a89d200002209e1b28ad944bf54cc933f0d5161c57c6bca676b1460867ef357d4c17
-
Filesize
5KB
MD592bec1bc3cafe495e53a157063122c6a
SHA101e2612c03c71e4b6d8967387dc3e8777d38db48
SHA256a596cb07154fe28087a4d783ecd92f41a05ca80f9ffc2c200326bcac170a1d06
SHA512f6e3e29c2f24462145a0c31192c4828f042257358fd3f1a5366a9850c5a2cfa92329d2f0c645ae9e3d4dcebc8d77edfec7b58e44cd3f4f3205679616d4773f48
-
Filesize
6KB
MD5f53774d9c8925ed4ab6680f583e0991d
SHA12ef0d32d49131ff02d619926b8a15a5db7b043c8
SHA25627209d99a9324beafc4181168ad81ec28b5519fac16ebd903e221bd8b5c09a2a
SHA512446a7fa0e75454dac02d8d937b9fe56cccf9dc1f595f292c58dcd4c059ad1b2366e01a3c250a20c7391eb997b252d09ee9f99f0aa6cf958e5f65c29f6d0ad834
-
Filesize
11KB
MD591b7cefd954e59926740690d291cda01
SHA1bbecb2c5630cb2fa2f9c2394c3a1addadc4a4696
SHA25698caa4dc1630f6bb91f55e6fe93c5702ba96bc97aa43b59b7c98c7f772cb3949
SHA51245c78b14e5b9778dddb31515a09923fac52e66de8e167f57a6792c7ab5219cc82722116bc1f745c82fa1b17ef2cef0b97d09a17222662e663b5356da73a62595