Analysis

  • max time kernel
    142s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/07/2024, 13:03

General

  • Target

    Broskie - Copy/node_modules/puppeteer-extra-plugin-stealth/evasions/user-agent-override/index.test.js

  • Size

    10KB

  • MD5

    0ced2f955f836dbdc42aa2f558c8af3c

  • SHA1

    61131a2b5442ec41a808979bc19887a6061117a2

  • SHA256

    6df98b4333fdbbbf383e75100effe6ea62db3f5ec350172e77a57575fa147cf6

  • SHA512

    b800145b66fea7d8da96d4f10bb3f134f556b73087d8a737a0a4889561fb7e0ba28ac566dc08810e98974e45a57ff61ed39f1f5ad237f12636fc3be041f89b1d

  • SSDEEP

    192:TZyUFOmGfb4IeOFLbCdlO1/bVXeOsC+Om7txOmIYDEElAykKn7kYYStmdJycCIk+:TZyUFOFfb4jOFLbCjO1/bVOOsbOOfOOI

Score
3/10

Malware Config

Signatures

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe "C:\Users\Admin\AppData\Local\Temp\Broskie - Copy\node_modules\puppeteer-extra-plugin-stealth\evasions\user-agent-override\index.test.js"
    1⤵
      PID:3732

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads