Malware Analysis Report

2024-10-16 06:24

Sample ID 240627-cpvwmszgmk
Target trigger.js
SHA256 1b82a20e13c0462e3f4d884435313fb3e41ec1a0946dfd55c46237300ab0e40f
Tags
antivm
score
4/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral4

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
4/10

SHA256

1b82a20e13c0462e3f4d884435313fb3e41ec1a0946dfd55c46237300ab0e40f

Threat Level: Likely benign

The file trigger.js was found to be: Likely benign.

Malicious Activity Summary

antivm

Checks CPU configuration

Reads CPU attributes

Changes its process name

Enumerates kernel/hardware configuration

Reads runtime system information

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-06-27 02:15

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-27 02:15

Reported

2024-06-27 02:15

Platform

android-x86-arm-20240624-en

Max time network

3s

Command Line

N/A

Signatures

N/A

Processes

N/A

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp

Files

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-27 02:15

Reported

2024-06-27 02:46

Platform

debian9-armhf-20240611-en

Max time kernel

9s

Max time network

1679s

Command Line

[node /tmp/trigger.js]

Signatures

Checks CPU configuration

antivm
Description Indicator Process Target
File opened for reading /proc/cpuinfo /usr/bin/node N/A

Reads CPU attributes

Description Indicator Process Target
File opened for reading /sys/devices/system/cpu/online /usr/bin/node N/A

Enumerates kernel/hardware configuration

Description Indicator Process Target
File opened for reading /sys/fs/cgroup/memory/memory.limit_in_bytes /usr/bin/node N/A

Reads runtime system information

Description Indicator Process Target
File opened for reading /proc/meminfo /usr/bin/node N/A

Processes

/usr/bin/node

[node /tmp/trigger.js]

Network

Country Destination Domain Proto
US 1.1.1.1:53 debian9-armhf-20240611-en-0 udp
US 1.1.1.1:53 debian9-armhf-20240611-en-0 udp

Files

N/A

Analysis: behavioral3

Detonation Overview

Submitted

2024-06-27 02:15

Reported

2024-06-27 02:47

Platform

debian9-mipsbe-20240418-en

Max time kernel

10s

Max time network

1679s

Command Line

[nodejs /tmp/trigger.js]

Signatures

Changes its process name

Description Indicator Process Target
Changes the process name, possibly in an attempt to hide itself V8 WorkerThread N/A N/A
Changes the process name, possibly in an attempt to hide itself V8 WorkerThread N/A N/A
Changes the process name, possibly in an attempt to hide itself V8 WorkerThread N/A N/A
Changes the process name, possibly in an attempt to hide itself V8 WorkerThread N/A N/A

Checks CPU configuration

antivm
Description Indicator Process Target
File opened for reading /proc/cpuinfo /usr/bin/nodejs N/A

Processes

/usr/bin/nodejs

[nodejs /tmp/trigger.js]

Network

Country Destination Domain Proto
US 1.1.1.1:53 debian9-mipsbe-20240418-en-8 udp
US 1.1.1.1:53 debian9-mipsbe-20240418-en-8 udp

Files

N/A

Analysis: behavioral4

Detonation Overview

Submitted

2024-06-27 02:15

Reported

2024-06-27 02:46

Platform

ubuntu1804-amd64-20240611-en

Max time kernel

0s

Max time network

1679s

Command Line

[node /tmp/trigger.js]

Signatures

Enumerates kernel/hardware configuration

Description Indicator Process Target
File opened for reading /sys/fs/cgroup/memory/memory.limit_in_bytes /usr/bin/node N/A

Reads runtime system information

Description Indicator Process Target
File opened for reading /proc/meminfo /usr/bin/node N/A

Processes

/usr/bin/node

[node /tmp/trigger.js]

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 185.125.188.62:443 tcp
GB 185.125.188.62:443 tcp
US 151.101.193.91:443 tcp
US 151.101.193.91:443 tcp
GB 195.181.164.14:443 tcp
US 1.1.1.1:53 1527653184.rsc.cdn77.org udp
US 1.1.1.1:53 1527653184.rsc.cdn77.org udp
GB 195.181.164.19:443 1527653184.rsc.cdn77.org tcp
US 1.1.1.1:53 connectivity-check.ubuntu.com udp
US 1.1.1.1:53 connectivity-check.ubuntu.com udp
GB 185.125.190.18:80 connectivity-check.ubuntu.com tcp
US 1.1.1.1:53 connectivity-check.ubuntu.com udp
US 1.1.1.1:53 connectivity-check.ubuntu.com udp
GB 185.125.190.18:80 connectivity-check.ubuntu.com tcp
US 1.1.1.1:53 connectivity-check.ubuntu.com udp
US 1.1.1.1:53 connectivity-check.ubuntu.com udp
GB 185.125.190.97:80 connectivity-check.ubuntu.com tcp
US 1.1.1.1:53 connectivity-check.ubuntu.com udp
US 1.1.1.1:53 connectivity-check.ubuntu.com udp
GB 185.125.190.98:80 connectivity-check.ubuntu.com tcp
US 1.1.1.1:53 connectivity-check.ubuntu.com udp
US 1.1.1.1:53 connectivity-check.ubuntu.com udp
GB 185.125.190.48:80 connectivity-check.ubuntu.com tcp
US 1.1.1.1:53 connectivity-check.ubuntu.com udp
US 1.1.1.1:53 connectivity-check.ubuntu.com udp
US 91.189.91.97:80 connectivity-check.ubuntu.com tcp

Files

N/A