Analysis
-
max time kernel
136s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30-08-2024 01:41
Static task
static1
Behavioral task
behavioral1
Sample
cbe5544ccb132ff6ed954a8de99ee72cb7ed561deccc3692f2a43fbe3f70844c.js
Resource
win7-20240705-en
windows7-x64
5 signatures
150 seconds
General
-
Target
cbe5544ccb132ff6ed954a8de99ee72cb7ed561deccc3692f2a43fbe3f70844c.js
-
Size
3.2MB
-
MD5
9e0754511bf8f2602a8d02fc96258cc9
-
SHA1
21b4921bf02aeb4fbb2d7dc71354cfc8d0edeb35
-
SHA256
cbe5544ccb132ff6ed954a8de99ee72cb7ed561deccc3692f2a43fbe3f70844c
-
SHA512
67f8ff9a42052225c04dc2235cd9c640181feda08c7214cd4c1f032283a04a73389a89249be99fe1546861da1522662f0ec9eaf6ce32552e2280d3ac3ef43bb8
-
SSDEEP
49152:xxICRL6XLRMEzaztox/8kvFJbeiO98i2VNcoKdaEA29jZkLyWkQ1E2OQUpCXupOY:B
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
mimikatz is an open source tool to dump credentials on Windows 2 IoCs
resource yara_rule behavioral2/memory/4764-6-0x0000020925E10000-0x0000020925EF9000-memory.dmp mimikatz behavioral2/memory/4764-9-0x0000020925E10000-0x0000020925EF9000-memory.dmp mimikatz -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4764 wscript.exe 4764 wscript.exe 4764 wscript.exe 4764 wscript.exe 4764 wscript.exe 4764 wscript.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4764 wscript.exe