Analysis

  • max time kernel
    134s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 01:50

General

  • Target

    7514209039_May_01_2019.js

  • Size

    39KB

  • MD5

    894aa32cbc169bc55f76dbc745a8a409

  • SHA1

    fa68cd456d468c0b5f501148107f0dcf726da043

  • SHA256

    b0840f0a422e5b418f84a7e2a15d30bdec48404257a8b7bd95a36ee7d6806feb

  • SHA512

    8e207d21917f818985d5467f029f87624fe2168d5b42cf64cbb2b1a497b957061014be720a5c00a57b918f1161f79784578f121412639d348ff54d3a8e0e3005

  • SSDEEP

    768:tvvuVEOojy4VaOvblKaOMvRQnRUm0eRbE4YTtWsVuNfeqro6OAFhUaEcd9pruwIv:tvIEOoj9VDvxKaOMqnR+nKGb7+liO3te

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\7514209039_May_01_2019.js
    1⤵
    • Blocklisted process makes network request
    • Checks computer location settings
    PID:2528

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\jzaxn5y5y.exe

    Filesize

    114B

    MD5

    e89f75f918dbdcee28604d4e09dd71d7

    SHA1

    f9d9055e9878723a12063b47d4a1a5f58c3eb1e9

    SHA256

    6dc9c7fc93bb488bb0520a6c780a8d3c0fb5486a4711aca49b4c53fac7393023

    SHA512

    8df0ab2e3679b64a6174deff4259ae5680f88e3ae307e0ea2dfff88ec4ba14f3477c9fe3a5aa5da3a8e857601170a5108ed75f6d6975958ac7a314e4a336aed0