Resubmissions
26-11-2024 05:37
241126-gbb9latlhp 826-11-2024 05:34
241126-f9mbsatlcr 326-11-2024 05:28
241126-f6dkgatkbq 526-11-2024 05:19
241126-fzwsgasqhk 326-11-2024 05:16
241126-fx7ryswnbv 426-11-2024 05:10
241126-ft7b1sspaq 326-11-2024 05:10
241126-ft1jgawlg1 326-11-2024 05:09
241126-ftmbvasngr 326-11-2024 05:06
241126-frdxpasmhk 4Analysis
-
max time kernel
69s -
max time network
75s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
26-11-2024 05:06
Static task
static1
General
-
Target
sample.js
-
Size
66KB
-
MD5
871ec2c9c1f5fb35e9aeccc269714074
-
SHA1
1e74f1f8acb9dd1248996fda1b68a5a970a1ca83
-
SHA256
5a2775ce2aae72216b9aca4ab5c16fcb097f23c8d0f1698f68585ff2db64a677
-
SHA512
e56a0e5aa5614a22d0f859098410accb0c1d44fab50b9e47396dd7c36c7e1938a636643c4ab1ca99a89aafbb9931fc7f085dacee03ed019eb7eb52d0ad6926d9
-
SSDEEP
1536:U69UFLCCwNieoupehNFZuSuWtWWxSRoH1rjWAkSSpcEqN2RI6ZsnJVr+5va0Ym6C:T9UFLhwjLRoH1rjWAkSSpcEqN2RI6Zsm
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133770712416893551" chrome.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeShutdownPrivilege 2788 chrome.exe Token: SeCreatePagefilePrivilege 2788 chrome.exe Token: SeShutdownPrivilege 2788 chrome.exe Token: SeCreatePagefilePrivilege 2788 chrome.exe Token: SeShutdownPrivilege 2788 chrome.exe Token: SeCreatePagefilePrivilege 2788 chrome.exe Token: SeShutdownPrivilege 2788 chrome.exe Token: SeCreatePagefilePrivilege 2788 chrome.exe Token: SeShutdownPrivilege 2788 chrome.exe Token: SeCreatePagefilePrivilege 2788 chrome.exe Token: SeShutdownPrivilege 2788 chrome.exe Token: SeCreatePagefilePrivilege 2788 chrome.exe Token: SeShutdownPrivilege 2788 chrome.exe Token: SeCreatePagefilePrivilege 2788 chrome.exe Token: SeShutdownPrivilege 2788 chrome.exe Token: SeCreatePagefilePrivilege 2788 chrome.exe Token: SeShutdownPrivilege 2788 chrome.exe Token: SeCreatePagefilePrivilege 2788 chrome.exe Token: SeShutdownPrivilege 2788 chrome.exe Token: SeCreatePagefilePrivilege 2788 chrome.exe Token: SeShutdownPrivilege 2788 chrome.exe Token: SeCreatePagefilePrivilege 2788 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2788 wrote to memory of 3128 2788 chrome.exe 96 PID 2788 wrote to memory of 3128 2788 chrome.exe 96 PID 2788 wrote to memory of 2656 2788 chrome.exe 97 PID 2788 wrote to memory of 2656 2788 chrome.exe 97 PID 2788 wrote to memory of 2656 2788 chrome.exe 97 PID 2788 wrote to memory of 2656 2788 chrome.exe 97 PID 2788 wrote to memory of 2656 2788 chrome.exe 97 PID 2788 wrote to memory of 2656 2788 chrome.exe 97 PID 2788 wrote to memory of 2656 2788 chrome.exe 97 PID 2788 wrote to memory of 2656 2788 chrome.exe 97 PID 2788 wrote to memory of 2656 2788 chrome.exe 97 PID 2788 wrote to memory of 2656 2788 chrome.exe 97 PID 2788 wrote to memory of 2656 2788 chrome.exe 97 PID 2788 wrote to memory of 2656 2788 chrome.exe 97 PID 2788 wrote to memory of 2656 2788 chrome.exe 97 PID 2788 wrote to memory of 2656 2788 chrome.exe 97 PID 2788 wrote to memory of 2656 2788 chrome.exe 97 PID 2788 wrote to memory of 2656 2788 chrome.exe 97 PID 2788 wrote to memory of 2656 2788 chrome.exe 97 PID 2788 wrote to memory of 2656 2788 chrome.exe 97 PID 2788 wrote to memory of 2656 2788 chrome.exe 97 PID 2788 wrote to memory of 2656 2788 chrome.exe 97 PID 2788 wrote to memory of 2656 2788 chrome.exe 97 PID 2788 wrote to memory of 2656 2788 chrome.exe 97 PID 2788 wrote to memory of 2656 2788 chrome.exe 97 PID 2788 wrote to memory of 2656 2788 chrome.exe 97 PID 2788 wrote to memory of 2656 2788 chrome.exe 97 PID 2788 wrote to memory of 2656 2788 chrome.exe 97 PID 2788 wrote to memory of 2656 2788 chrome.exe 97 PID 2788 wrote to memory of 2656 2788 chrome.exe 97 PID 2788 wrote to memory of 2656 2788 chrome.exe 97 PID 2788 wrote to memory of 2656 2788 chrome.exe 97 PID 2788 wrote to memory of 856 2788 chrome.exe 98 PID 2788 wrote to memory of 856 2788 chrome.exe 98 PID 2788 wrote to memory of 3496 2788 chrome.exe 99 PID 2788 wrote to memory of 3496 2788 chrome.exe 99 PID 2788 wrote to memory of 3496 2788 chrome.exe 99 PID 2788 wrote to memory of 3496 2788 chrome.exe 99 PID 2788 wrote to memory of 3496 2788 chrome.exe 99 PID 2788 wrote to memory of 3496 2788 chrome.exe 99 PID 2788 wrote to memory of 3496 2788 chrome.exe 99 PID 2788 wrote to memory of 3496 2788 chrome.exe 99 PID 2788 wrote to memory of 3496 2788 chrome.exe 99 PID 2788 wrote to memory of 3496 2788 chrome.exe 99 PID 2788 wrote to memory of 3496 2788 chrome.exe 99 PID 2788 wrote to memory of 3496 2788 chrome.exe 99 PID 2788 wrote to memory of 3496 2788 chrome.exe 99 PID 2788 wrote to memory of 3496 2788 chrome.exe 99 PID 2788 wrote to memory of 3496 2788 chrome.exe 99 PID 2788 wrote to memory of 3496 2788 chrome.exe 99 PID 2788 wrote to memory of 3496 2788 chrome.exe 99 PID 2788 wrote to memory of 3496 2788 chrome.exe 99 PID 2788 wrote to memory of 3496 2788 chrome.exe 99 PID 2788 wrote to memory of 3496 2788 chrome.exe 99 PID 2788 wrote to memory of 3496 2788 chrome.exe 99 PID 2788 wrote to memory of 3496 2788 chrome.exe 99 PID 2788 wrote to memory of 3496 2788 chrome.exe 99 PID 2788 wrote to memory of 3496 2788 chrome.exe 99 PID 2788 wrote to memory of 3496 2788 chrome.exe 99 PID 2788 wrote to memory of 3496 2788 chrome.exe 99 PID 2788 wrote to memory of 3496 2788 chrome.exe 99 PID 2788 wrote to memory of 3496 2788 chrome.exe 99 PID 2788 wrote to memory of 3496 2788 chrome.exe 99 PID 2788 wrote to memory of 3496 2788 chrome.exe 99
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\sample.js1⤵PID:3080
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵PID:4620
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ff817ebcc40,0x7ff817ebcc4c,0x7ff817ebcc582⤵PID:3128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2236,i,1087940179260292054,4380992403388998337,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=2232 /prefetch:22⤵PID:2656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1932,i,1087940179260292054,4380992403388998337,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=2252 /prefetch:32⤵PID:856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2036,i,1087940179260292054,4380992403388998337,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=2496 /prefetch:82⤵PID:3496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3152,i,1087940179260292054,4380992403388998337,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=3172 /prefetch:12⤵PID:1920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3180,i,1087940179260292054,4380992403388998337,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:4084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4628,i,1087940179260292054,4380992403388998337,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=4536 /prefetch:12⤵PID:2708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4756,i,1087940179260292054,4380992403388998337,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=3708 /prefetch:12⤵PID:3088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5480,i,1087940179260292054,4380992403388998337,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=5516 /prefetch:82⤵PID:888
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4624
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:236
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5096064456ebce21ccba899795d73082e
SHA17c13cf9ab269a2c5b29632edad95978c3c310b85
SHA2560f045b818cd349feae2ea4ab55fa939341752f5b9cfae47f0bbf94a8655018b5
SHA512634b98688cccd0035079147870f3fa745e8c771157e99498576352e2cfb207565a05802992ed2c44a60e3d5b14e7b0034b9378182b942c65b2e78d2c945a6312
-
Filesize
1KB
MD539ced3f0a9b4655a1d4e9599ddd0252b
SHA12420ee46612256684756e785770ff4b6dc0f0e2a
SHA256d2d1c66b74d195856f5e643146284bca98f2c175b108721fa1549d39a0f92fd8
SHA51293a452b88799799830b8eb284df31eea33418457e855248aaa00d3eb70ad06928ae504c6f955a4fdd6f002a6b6ada0e7f4c5ea500018a9a0df9f0dafa6d07383
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
9KB
MD5d32b064187872e5934988e6c1cb0f6ea
SHA1f411442f63445fcdfe0ee035eb31a826b0961888
SHA2564c7de7a24c099cdc42256e5f5a54f3d27c7c6cc08180c21d7e73e425474e30c1
SHA512dc50650e9529f1745e8fb96f69767391cd0cf3dbcea29a0057d15c57bce9f60a3cfc0e189c2cf9899099d1e24ee7e1ae4742a8a604c42fbcc22158fa0f566f81
-
Filesize
118KB
MD58a0fed95563e015da00b962a4645a729
SHA1ab6e4bc13d876d49a6c167dc9ed50b1327e216b0
SHA2567d3516c8c29b907f70a17c22d80b2c6dfe237a500373285b86b258edf21d9dff
SHA5127cc08df8e4469aa8a7e75f53c1e7c4a2abce783955ee08382ac156fe47cfdf6654a707e48e0f5dc3677f470961642dce996cdbe04a5a47cd88aba6b6d5f256d1
-
Filesize
118KB
MD565f52f54d26be5ea235526ef6b120ebf
SHA1d0b070d6838e72f1c84c422474ae947ae90dceee
SHA256e240688366ad43fdfd4ea7f2fba6f0826ed6ca3b3a76641b9593da487d365202
SHA5122ac379390e31f9d70131ecb313cbad6f3738132b63b052590c8678eeac03e8da7816f1359052f47e471974f287a3082585e3a14c07697a885a153426fdd98c55
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58