Malware Analysis Report

2024-10-16 06:33

Sample ID 240608-2snzyahe7x
Target code.js
SHA256 ccb15af07344d41d2db6ab2e27803adc34daa79a62382ae150c3959f1b891b4c
Tags
execution
score
3/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral4

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral5

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
3/10

SHA256

ccb15af07344d41d2db6ab2e27803adc34daa79a62382ae150c3959f1b891b4c

Threat Level: Likely benign

The file code.js was found to be: Likely benign.

Malicious Activity Summary

execution

Command and Scripting Interpreter: JavaScript

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-06-08 22:50

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-08 22:50

Reported

2024-06-08 22:59

Platform

win7-20240508-en

Max time kernel

357s

Max time network

358s

Command Line

wscript.exe C:\Users\Admin\AppData\Local\Temp\code.js

Signatures

Command and Scripting Interpreter: JavaScript

execution

Processes

C:\Windows\system32\wscript.exe

wscript.exe C:\Users\Admin\AppData\Local\Temp\code.js

Network

N/A

Files

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-08 22:50

Reported

2024-06-08 22:51

Platform

android-x86-arm-20240603-en

Max time network

4s

Command Line

N/A

Signatures

N/A

Processes

N/A

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp

Files

N/A

Analysis: behavioral3

Detonation Overview

Submitted

2024-06-08 22:50

Reported

2024-06-08 22:51

Platform

android-x64-20240603-en

Max time network

5s

Command Line

N/A

Signatures

N/A

Processes

N/A

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp

Files

N/A

Analysis: behavioral4

Detonation Overview

Submitted

2024-06-08 22:50

Reported

2024-06-08 22:51

Platform

android-x64-arm64-20240603-en

Max time network

6s

Command Line

N/A

Signatures

N/A

Processes

N/A

Network

Country Destination Domain Proto
GB 142.250.187.238:443 tcp
GB 142.250.187.238:443 tcp
N/A 224.0.0.251:5353 udp

Files

N/A

Analysis: behavioral5

Detonation Overview

Submitted

2024-06-08 22:50

Reported

2024-06-08 22:58

Platform

macos-20240410-en

Max time kernel

234s

Max time network

227s

Command Line

[sh -c sudo /bin/zsh -c "/Users/run/code.js"]

Signatures

N/A

Processes

/bin/sh

[sh -c sudo /bin/zsh -c "/Users/run/code.js"]

/bin/bash

[sh -c sudo /bin/zsh -c "/Users/run/code.js"]

/usr/bin/sudo

[sudo /bin/zsh -c /Users/run/code.js]

/bin/zsh

[/bin/zsh -c /Users/run/code.js]

/Users/run/code.js

[/Users/run/code.js]

/bin/sh

[sh /Users/run/code.js]

/bin/bash

[sh /Users/run/code.js]

ipconfig/all

[ipconfig/all ]

/usr/sbin/spctl

[/usr/sbin/spctl --assess --type execute /Applications/OneDrive.app]

/bin/launchctl

[/bin/launchctl kill SIGTERM system/com.microsoft.OneDriveUpdaterDaemon]

/bin/launchctl

[/bin/launchctl kill SIGTERM system/com.microsoft.OneDriveStandaloneUpdaterDaemon]

/usr/libexec/xpcproxy

[xpcproxy com.apple.corespotlightservice.725FD30A-6064-6C02-CC51-5DDB8891B57E]

/System/Library/Frameworks/CoreSpotlight.framework/CoreSpotlightService

[/System/Library/Frameworks/CoreSpotlight.framework/CoreSpotlightService]

Network

Country Destination Domain Proto
DE 20.52.64.201:443 tcp
US 8.8.8.8:53 bag-cdn-lb.itunes-apple.com.akadns.net udp
GB 17.250.81.67:443 tcp
N/A 224.0.0.251:5353 udp
US 8.8.8.8:53 mobile.events.data.trafficmanager.net udp
DE 51.116.246.105:443 tcp
US 8.8.8.8:53 cds.apple.com udp
US 8.8.8.8:53 help.apple.com udp

Files

N/A