Analysis
-
max time kernel
119s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
13/07/2024, 17:52
Static task
static1
Behavioral task
behavioral1
Sample
main.js
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
main.js
Resource
win10v2004-20240709-en
General
-
Target
main.js
-
Size
2KB
-
MD5
3ce53155462e9380da3910f8d5dee973
-
SHA1
a98cce7a61a857dfe25290afaec839c405ab1611
-
SHA256
3b5a32a659f0c4cb1e47f32c865c05d3630cfe9fc8db0c68fe75a2ca5c015153
-
SHA512
0cc270b8e104c90846194163b3c77201a72dda515d4de8407f10ad9205b748656599e6405a43a39a04dd24ed8736d2fc2b3f32052b2e242f5c1a1a7c759301c5
Malware Config
Signatures
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2960 chrome.exe 2960 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe Token: SeShutdownPrivilege 2960 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe 2960 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2960 wrote to memory of 2736 2960 chrome.exe 31 PID 2960 wrote to memory of 2736 2960 chrome.exe 31 PID 2960 wrote to memory of 2736 2960 chrome.exe 31 PID 2960 wrote to memory of 2628 2960 chrome.exe 33 PID 2960 wrote to memory of 2628 2960 chrome.exe 33 PID 2960 wrote to memory of 2628 2960 chrome.exe 33 PID 2960 wrote to memory of 2628 2960 chrome.exe 33 PID 2960 wrote to memory of 2628 2960 chrome.exe 33 PID 2960 wrote to memory of 2628 2960 chrome.exe 33 PID 2960 wrote to memory of 2628 2960 chrome.exe 33 PID 2960 wrote to memory of 2628 2960 chrome.exe 33 PID 2960 wrote to memory of 2628 2960 chrome.exe 33 PID 2960 wrote to memory of 2628 2960 chrome.exe 33 PID 2960 wrote to memory of 2628 2960 chrome.exe 33 PID 2960 wrote to memory of 2628 2960 chrome.exe 33 PID 2960 wrote to memory of 2628 2960 chrome.exe 33 PID 2960 wrote to memory of 2628 2960 chrome.exe 33 PID 2960 wrote to memory of 2628 2960 chrome.exe 33 PID 2960 wrote to memory of 2628 2960 chrome.exe 33 PID 2960 wrote to memory of 2628 2960 chrome.exe 33 PID 2960 wrote to memory of 2628 2960 chrome.exe 33 PID 2960 wrote to memory of 2628 2960 chrome.exe 33 PID 2960 wrote to memory of 2628 2960 chrome.exe 33 PID 2960 wrote to memory of 2628 2960 chrome.exe 33 PID 2960 wrote to memory of 2628 2960 chrome.exe 33 PID 2960 wrote to memory of 2628 2960 chrome.exe 33 PID 2960 wrote to memory of 2628 2960 chrome.exe 33 PID 2960 wrote to memory of 2628 2960 chrome.exe 33 PID 2960 wrote to memory of 2628 2960 chrome.exe 33 PID 2960 wrote to memory of 2628 2960 chrome.exe 33 PID 2960 wrote to memory of 2628 2960 chrome.exe 33 PID 2960 wrote to memory of 2628 2960 chrome.exe 33 PID 2960 wrote to memory of 2628 2960 chrome.exe 33 PID 2960 wrote to memory of 2628 2960 chrome.exe 33 PID 2960 wrote to memory of 2628 2960 chrome.exe 33 PID 2960 wrote to memory of 2628 2960 chrome.exe 33 PID 2960 wrote to memory of 2628 2960 chrome.exe 33 PID 2960 wrote to memory of 2628 2960 chrome.exe 33 PID 2960 wrote to memory of 2628 2960 chrome.exe 33 PID 2960 wrote to memory of 2628 2960 chrome.exe 33 PID 2960 wrote to memory of 2628 2960 chrome.exe 33 PID 2960 wrote to memory of 2628 2960 chrome.exe 33 PID 2960 wrote to memory of 2700 2960 chrome.exe 34 PID 2960 wrote to memory of 2700 2960 chrome.exe 34 PID 2960 wrote to memory of 2700 2960 chrome.exe 34 PID 2960 wrote to memory of 1048 2960 chrome.exe 35 PID 2960 wrote to memory of 1048 2960 chrome.exe 35 PID 2960 wrote to memory of 1048 2960 chrome.exe 35 PID 2960 wrote to memory of 1048 2960 chrome.exe 35 PID 2960 wrote to memory of 1048 2960 chrome.exe 35 PID 2960 wrote to memory of 1048 2960 chrome.exe 35 PID 2960 wrote to memory of 1048 2960 chrome.exe 35 PID 2960 wrote to memory of 1048 2960 chrome.exe 35 PID 2960 wrote to memory of 1048 2960 chrome.exe 35 PID 2960 wrote to memory of 1048 2960 chrome.exe 35 PID 2960 wrote to memory of 1048 2960 chrome.exe 35 PID 2960 wrote to memory of 1048 2960 chrome.exe 35 PID 2960 wrote to memory of 1048 2960 chrome.exe 35 PID 2960 wrote to memory of 1048 2960 chrome.exe 35 PID 2960 wrote to memory of 1048 2960 chrome.exe 35 PID 2960 wrote to memory of 1048 2960 chrome.exe 35 PID 2960 wrote to memory of 1048 2960 chrome.exe 35 PID 2960 wrote to memory of 1048 2960 chrome.exe 35 PID 2960 wrote to memory of 1048 2960 chrome.exe 35
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\main.js1⤵PID:2276
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef70d9758,0x7fef70d9768,0x7fef70d97782⤵PID:2736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1176 --field-trial-handle=1304,i,5489691272006080574,4808459027092910425,131072 /prefetch:22⤵PID:2628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1520 --field-trial-handle=1304,i,5489691272006080574,4808459027092910425,131072 /prefetch:82⤵PID:2700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1624 --field-trial-handle=1304,i,5489691272006080574,4808459027092910425,131072 /prefetch:82⤵PID:1048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2280 --field-trial-handle=1304,i,5489691272006080574,4808459027092910425,131072 /prefetch:12⤵PID:264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2292 --field-trial-handle=1304,i,5489691272006080574,4808459027092910425,131072 /prefetch:12⤵PID:1644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1344 --field-trial-handle=1304,i,5489691272006080574,4808459027092910425,131072 /prefetch:22⤵PID:2464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1460 --field-trial-handle=1304,i,5489691272006080574,4808459027092910425,131072 /prefetch:12⤵PID:1484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3676 --field-trial-handle=1304,i,5489691272006080574,4808459027092910425,131072 /prefetch:82⤵PID:1548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3680 --field-trial-handle=1304,i,5489691272006080574,4808459027092910425,131072 /prefetch:12⤵PID:2952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=900 --field-trial-handle=1304,i,5489691272006080574,4808459027092910425,131072 /prefetch:12⤵PID:2788
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2796
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
211KB
MD5151fb811968eaf8efb840908b89dc9d4
SHA17ec811009fd9b0e6d92d12d78b002275f2f1bee1
SHA256043fd8558e4a5a60aaccd2f0377f77a544e3e375242e9d7200dc6e51f94103ed
SHA51283aface0ab01da52fd077f747c9d5916e3c06b0ea5c551d7d316707ec3e8f3f986ce1c82e6f2136e48c6511a83cb0ac67ff6dc8f0e440ac72fc6854086a87674
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
1KB
MD5338a500b9fc27407d2a9231325e9286c
SHA1942ca9aa7eed9068272b7bdffa4d77df90bc2bd4
SHA256f7fe8eece3c06f6571ead883e9efb30adc1c848ec8ef6705b86d5785d83093ca
SHA5123c8995d705b8e209d5843e4bc053812b01121d28a17583e77a5a6371e4c37cad82d9e8076535a183082be7b40841d4f04ab159a5d38367ff416dc6776850b60d
-
Filesize
361B
MD5d76b54f3b40b74b37f72047f6aa8f726
SHA1b46be201b464cf72b10c595d0278e2415181e6ae
SHA256db69e1613754c1d82cfc5a32c775469baf55d572abb88ee4438e7cfaacfce5b6
SHA512eac2c9c11a1d7042276ec96d166c8262a944fe8fe34690c2ebf402100ab1eb7dc065965ed900954ed92ec24902d48dded2394da9d561cb9d8cb6c8840f2d0adb
-
Filesize
5KB
MD5c1c2fb848d3129c0906f954d6a119955
SHA1325cee0f2aed32a01c12849ed043da7477b7ea73
SHA2566b8e0eefdb2d2b8599ad2d2dcc850f9b226171635ccf922461b94a5881d2b219
SHA51206871f9283be7e955b7215e0ed93b97182111fba6b032bfc1c8a82493e4cf18b7a865fd7a53538e8fa705b4b4943cef2efba701ac7e15051c7d3453f59a5da71
-
Filesize
6KB
MD5fef02b6794cdf3c0224eaeccb53a20af
SHA1551bc511a659b3b75f37e0746d309f82431144d7
SHA25637e21246b609f6176eb5334a31663bbaedcbbcb58eeef06ea534798a89f830fb
SHA512b9be7a4a6fe7d78416b83500de2cc5f44718b588a696d8618b2d4f1ddb5f02fb5272e602f711cf171d9b1bc6336720de8a1920eb38d3626cbe6986453d6e5c4a
-
Filesize
5KB
MD5de15a3a49326dd3a5d513b1c923852fb
SHA1435bb69533a41c1722d9681e825c9b945b989430
SHA25628678166c762be75942ac35d6b5f1a8dc0311daf0f860fc1047151e0590dbd9f
SHA5126055305d5c0a85fab076ddeef5eedac96866df8950fbee340dee861cd9f1b0c14efc30406d92c815e36391dd326aa01e49ecc79d12c2ef129197dcc5cd6677a9
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2