Resubmissions

19-09-2024 21:39

240919-1hv5tssapf 5

19-09-2024 21:25

240919-z9xx3a1flc 5

Analysis

  • max time kernel
    300s
  • max time network
    268s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    19-09-2024 21:25

General

  • Target

    .js

  • Size

    1.0MB

  • MD5

    a1321924d8c6b6fd01777d097f0aa055

  • SHA1

    d0293e26f615a05d0577692761639ddc577b5bc8

  • SHA256

    3ff914f8e79247c3328e971256119eb71f4dd88024f4cb2ffccef91860126db8

  • SHA512

    356aa288859cb1243d690d958c7b06f99f32a9aa354e8e87bb242af6a9fa070d5b4dc999edb83c60484162161311146601864bdc8a6cb11664ab21fc3cd9f670

  • SSDEEP

    12288:AhMXL2rn65hYlWiOFC+Mu1F2KPe9OfzaBexvk3ldQXXBPvZX5nhb6Q:dQn652lOF5K9Ve5nX5jwQ

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 26 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\.js
    1⤵
      PID:3152
    • C:\Windows\system32\SearchIndexer.exe
      C:\Windows\system32\SearchIndexer.exe /Embedding
      1⤵
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1396
      • C:\Windows\system32\SearchProtocolHost.exe
        "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"
        2⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        PID:3952
      • C:\Windows\system32\SearchFilterHost.exe
        "C:\Windows\system32\SearchFilterHost.exe" 0 684 688 696 8192 692
        2⤵
        • Modifies data under HKEY_USERS
        PID:1304

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1304-67-0x00000243BC820000-0x00000243BC830000-memory.dmp

      Filesize

      64KB

    • memory/1304-66-0x00000243BC820000-0x00000243BC830000-memory.dmp

      Filesize

      64KB

    • memory/1304-88-0x00000243BC820000-0x00000243BC830000-memory.dmp

      Filesize

      64KB

    • memory/1304-85-0x00000243BC820000-0x00000243BC830000-memory.dmp

      Filesize

      64KB

    • memory/1304-62-0x00000243BC820000-0x00000243BC830000-memory.dmp

      Filesize

      64KB

    • memory/1304-83-0x00000243BC820000-0x00000243BC830000-memory.dmp

      Filesize

      64KB

    • memory/1304-84-0x00000243BC820000-0x00000243BC830000-memory.dmp

      Filesize

      64KB

    • memory/1304-65-0x00000243BC820000-0x00000243BC830000-memory.dmp

      Filesize

      64KB

    • memory/1304-82-0x00000243BC820000-0x00000243BC830000-memory.dmp

      Filesize

      64KB

    • memory/1304-68-0x00000243BC820000-0x00000243BC830000-memory.dmp

      Filesize

      64KB

    • memory/1304-51-0x00000243BC820000-0x00000243BC830000-memory.dmp

      Filesize

      64KB

    • memory/1304-54-0x00000243BC820000-0x00000243BC830000-memory.dmp

      Filesize

      64KB

    • memory/1304-58-0x00000243BC820000-0x00000243BC830000-memory.dmp

      Filesize

      64KB

    • memory/1304-59-0x00000243BC820000-0x00000243BC830000-memory.dmp

      Filesize

      64KB

    • memory/1304-57-0x00000243BC820000-0x00000243BC830000-memory.dmp

      Filesize

      64KB

    • memory/1304-56-0x00000243BC820000-0x00000243BC830000-memory.dmp

      Filesize

      64KB

    • memory/1304-81-0x00000243BC820000-0x00000243BC830000-memory.dmp

      Filesize

      64KB

    • memory/1304-78-0x00000243BC820000-0x00000243BC830000-memory.dmp

      Filesize

      64KB

    • memory/1304-49-0x00000243BC7C0000-0x00000243BC7D0000-memory.dmp

      Filesize

      64KB

    • memory/1304-69-0x00000243BC820000-0x00000243BC830000-memory.dmp

      Filesize

      64KB

    • memory/1304-73-0x00000243BC820000-0x00000243BC830000-memory.dmp

      Filesize

      64KB

    • memory/1304-75-0x00000243BC820000-0x00000243BC830000-memory.dmp

      Filesize

      64KB

    • memory/1304-74-0x00000243BC820000-0x00000243BC830000-memory.dmp

      Filesize

      64KB

    • memory/1304-72-0x00000243BC820000-0x00000243BC830000-memory.dmp

      Filesize

      64KB

    • memory/1304-77-0x00000243BC7C0000-0x00000243BC7D0000-memory.dmp

      Filesize

      64KB

    • memory/1396-0-0x000001B8B4070000-0x000001B8B4080000-memory.dmp

      Filesize

      64KB

    • memory/1396-17-0x000001B8B4230000-0x000001B8B4240000-memory.dmp

      Filesize

      64KB

    • memory/1396-44-0x000001B8BD100000-0x000001B8BD108000-memory.dmp

      Filesize

      32KB

    • memory/1396-38-0x000001B8BCAB0000-0x000001B8BCAB8000-memory.dmp

      Filesize

      32KB

    • memory/1396-45-0x000001B8BA110000-0x000001B8BA111000-memory.dmp

      Filesize

      4KB

    • memory/1396-42-0x000001B8BCFB0000-0x000001B8BCFB8000-memory.dmp

      Filesize

      32KB

    • memory/1396-40-0x000001B8B9C20000-0x000001B8B9C28000-memory.dmp

      Filesize

      32KB

    • memory/1396-36-0x000001B8BB9B0000-0x000001B8BB9B8000-memory.dmp

      Filesize

      32KB

    • memory/1396-32-0x000001B8B86D0000-0x000001B8B86D8000-memory.dmp

      Filesize

      32KB