Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
31-08-2021 16:35
Static task
static1
Behavioral task
behavioral1
Sample
#P0081.js
Resource
win7v20210408
Behavioral task
behavioral2
Sample
#P0081.js
Resource
win10v20210408
General
-
Target
#P0081.js
-
Size
12KB
-
MD5
f11cc55481ff89ec58a4deae47fbd05c
-
SHA1
d777ebeae01c1ebe4b5167660d086142ddc8b886
-
SHA256
154a7b5cc9e3c3f3d4721ebe993f88b7594efa3f2b3b1d61a23c8f6fae409f32
-
SHA512
026ad8686b8073c8a3b219309d09b97b7372eec6b24be907897b36064917a2c9a925f25ef063020a9da005fe8048db861130d82bbc5c989fce65cd4aecfd9412
Malware Config
Signatures
-
Blocklisted process makes network request 29 IoCs
Processes:
wscript.exewscript.exewscript.exeWScript.exeflow pid process 11 804 wscript.exe 17 2276 wscript.exe 19 2276 wscript.exe 20 2276 wscript.exe 21 2276 wscript.exe 22 2276 wscript.exe 23 2276 wscript.exe 24 2276 wscript.exe 25 2276 wscript.exe 26 2276 wscript.exe 27 2176 wscript.exe 28 2176 wscript.exe 29 2276 wscript.exe 30 2176 wscript.exe 31 2276 wscript.exe 32 2176 wscript.exe 33 2276 wscript.exe 34 2176 wscript.exe 35 2276 wscript.exe 36 2176 wscript.exe 37 2276 wscript.exe 38 2176 wscript.exe 39 2276 wscript.exe 40 2176 wscript.exe 41 2952 WScript.exe 42 2276 wscript.exe 43 2176 wscript.exe 44 2276 wscript.exe 45 2176 wscript.exe -
Drops startup file 8 IoCs
Processes:
wscript.exeWScript.exewscript.exeWScript.exewscript.exeWScript.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\QYQO3A4HSV.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ZM7G2H873M.js WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ZM7G2H873M.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7GYRYL2WHW.js WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7GYRYL2WHW.js WScript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\#P0081.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\#P0081.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\QYQO3A4HSV.js WScript.exe -
Adds Run key to start application 2 TTPs 20 IoCs
Processes:
WScript.exewscript.exewscript.exeWScript.exeWScript.exewscript.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\QYQO3A4HSV = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\QYQO3A4HSV.js\"" WScript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ZM7G2H873M = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\ZM7G2H873M.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\GF5EHB4I0U = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\7GYRYL2WHW.js\"" WScript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\QYQO3A4HSV = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\QYQO3A4HSV.js\"" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\ZM7G2H873M = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\ZM7G2H873M.js\"" WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ZM7G2H873M = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\ZM7G2H873M.js\"" WScript.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\ZM7G2H873M = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\ZM7G2H873M.js\"" wscript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\VXBM5F7PI1 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\#P0081.js\"" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\QYQO3A4HSV = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\QYQO3A4HSV.js\"" WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\QYQO3A4HSV = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\QYQO3A4HSV.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\software\microsoft\windows\currentversion\run WScript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run WScript.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run wscript.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\software\microsoft\windows\currentversion\run WScript.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\software\microsoft\windows\currentversion\run wscript.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 16 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Modifies registry class 1 IoCs
Processes:
wscript.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings wscript.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
wscript.exeWScript.exeWScript.exeWScript.exedescription pid process target process PID 804 wrote to memory of 684 804 wscript.exe schtasks.exe PID 804 wrote to memory of 684 804 wscript.exe schtasks.exe PID 804 wrote to memory of 2640 804 wscript.exe WScript.exe PID 804 wrote to memory of 2640 804 wscript.exe WScript.exe PID 2640 wrote to memory of 2276 2640 WScript.exe wscript.exe PID 2640 wrote to memory of 2276 2640 WScript.exe wscript.exe PID 804 wrote to memory of 2224 804 wscript.exe WScript.exe PID 804 wrote to memory of 2224 804 wscript.exe WScript.exe PID 2224 wrote to memory of 2176 2224 WScript.exe wscript.exe PID 2224 wrote to memory of 2176 2224 WScript.exe wscript.exe PID 804 wrote to memory of 2952 804 wscript.exe WScript.exe PID 804 wrote to memory of 2952 804 wscript.exe WScript.exe PID 2952 wrote to memory of 3952 2952 WScript.exe schtasks.exe PID 2952 wrote to memory of 3952 2952 WScript.exe schtasks.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\#P0081.js1⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Local\Temp\#P0081.js2⤵
- Creates scheduled task(s)
PID:684 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\QYQO3A4HSV.js"2⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\QYQO3A4HSV.js"3⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
PID:2276 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\ZM7G2H873M.js"2⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\ZM7G2H873M.js"3⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
PID:2176 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\7GYRYL2WHW.js"2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Local\Temp\7GYRYL2WHW.js3⤵
- Creates scheduled task(s)
PID:3952
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\DRMDU4BX\json[1].jsonMD5
0c17abb0ed055fecf0c48bb6e46eb4eb
SHA1a692730c8ec7353c31b94a888f359edb54aaa4c8
SHA256f41e99f954e33e7b0e39930ec8620bf29801efc44275c1ee6b5cfa5e1be202c0
SHA512645a9f2f94461d8a187261b736949df398ece5cfbf1af8653d18d3487ec1269d9f565534c1e249c12f31b3b1a41a8512953b1e991b001fc1360059e3fd494ec3
-
C:\Users\Admin\AppData\Local\Temp\7GYRYL2WHW.jsMD5
737ab81779d546b3ccc019569acb0269
SHA1d746edccdfb5ba9f357ab6a6281c1c09c25b5912
SHA25681f1d78c95edb2952a13f5ec068a3b30be04c4e128c6348bc07439a4f4fdd82c
SHA512961b5f3f1913595352914bd159c34d3767b96494a5be211cd69dbe64f921b29a12321498298ee0c93e3b2c85a443c0fd9b4593dc73fe3266e8517e17e5bfa951
-
C:\Users\Admin\AppData\Local\Temp\QYQO3A4HSV.jsMD5
89163b043aec880959009669fc474944
SHA13b7c55c3a4c6f4711d426dc27fb8a17e11af3de8
SHA25645bfabe4a6881d0321bac8905924576300aa5e20d502840e9196f5ca5fcf8836
SHA512eeb0074471e34becabb94c6ebcf3be3c31f47bbaba8dd9a38fef10c44af16cd08a5fc5bcbd970c1110ed53b409fa90b053e2987298ca0839fc0bed4ebbb654ae
-
C:\Users\Admin\AppData\Local\Temp\ZM7G2H873M.jsMD5
eeb113b12cde1c10b750e987d1377987
SHA1ecc3ad2423c8a6fa71075755e17931845f9d526e
SHA2568534f6deb0eb684d41427390e89265b176a4ca54a493b495e2ed3e2e96e24cf2
SHA51270b8b89580599ff746f75367848ed46aa64d97077757d7d9c7479beecba36d1ac731b81d78b972f6d9218e39970b25950fedc6745aee84a006eee1f7c549e11c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\QYQO3A4HSV.jsMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ZM7G2H873M.jsMD5
74b40a0af45a27a9d0775e0258ff41ba
SHA14a03120a256f9887ebebf8a3206a7e4ecf58c527
SHA256bf54ea19bcd7d7d9bbb15d642b6d3cc58d1498d7c5351500221883ae23dbe50a
SHA512b717a57320f5ce37f48596a6807b2b3df23b971f0da0ff6f00596893db4e327a75c1a57f4a50c26fd0bc380a386cab37d84f6b8fd03458019b25b35614637e41
-
C:\Users\Admin\AppData\Roaming\QYQO3A4HSV.jsMD5
89163b043aec880959009669fc474944
SHA13b7c55c3a4c6f4711d426dc27fb8a17e11af3de8
SHA25645bfabe4a6881d0321bac8905924576300aa5e20d502840e9196f5ca5fcf8836
SHA512eeb0074471e34becabb94c6ebcf3be3c31f47bbaba8dd9a38fef10c44af16cd08a5fc5bcbd970c1110ed53b409fa90b053e2987298ca0839fc0bed4ebbb654ae
-
C:\Users\Admin\AppData\Roaming\ZM7G2H873M.jsMD5
eeb113b12cde1c10b750e987d1377987
SHA1ecc3ad2423c8a6fa71075755e17931845f9d526e
SHA2568534f6deb0eb684d41427390e89265b176a4ca54a493b495e2ed3e2e96e24cf2
SHA51270b8b89580599ff746f75367848ed46aa64d97077757d7d9c7479beecba36d1ac731b81d78b972f6d9218e39970b25950fedc6745aee84a006eee1f7c549e11c
-
memory/684-114-0x0000000000000000-mapping.dmp
-
memory/2176-122-0x0000000000000000-mapping.dmp
-
memory/2224-120-0x0000000000000000-mapping.dmp
-
memory/2276-117-0x0000000000000000-mapping.dmp
-
memory/2640-115-0x0000000000000000-mapping.dmp
-
memory/2952-126-0x0000000000000000-mapping.dmp
-
memory/3952-128-0x0000000000000000-mapping.dmp