Analysis

  • max time kernel
    93s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-05-2024 06:22

General

  • Target

    T-465916-04242019.js

  • Size

    26KB

  • MD5

    dc325decfb873739d6c09055b09fc043

  • SHA1

    50dfe46b30f8dee35bc6f1285138e3dd631165ee

  • SHA256

    f9a3d8d2568059bff0da6d27fe8d474fa8dc1c0f97c24433f2fd9caed3594b0f

  • SHA512

    3a468cb4ad8ebc69cd53891868949856bd5877b72191bcc500b097bd2e090ee326ca8ef82b6f0d69f9296ab79091c57788d09f905f9b8eefd87a34af3aad341f

  • SSDEEP

    768:/mpSpUgP3uPJSNRAyMLNhRKl0TSGkFDbLKXyAXStfwzrR2nr2IT1JRT2xML1i7GS:OpSpUgP3kSNJMLAqqo

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 14 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\T-465916-04242019.js
    1⤵
    • Blocklisted process makes network request
    • Checks computer location settings
    PID:4848

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\c50j4mm9j.exe

    Filesize

    61KB

    MD5

    e975aa4ccf8f37444edf395c7ee605f5

    SHA1

    757173ad7cc7e9d74fad8d48c9d0940e74577e25

    SHA256

    3d5e24ceb8758ef8e6c885a1cbfe176a7d2675afa7ec3417f9fbc1f776810aa3

    SHA512

    4506c75e135e135c2f3e3fa46de778f5c1e2fe055602556f878cddbbfa2d4a5902faf0186c309b577ed72a2f734b571561a195e6efc2636b783549d164aa84ff