Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
05-09-2021 10:30
Static task
static1
Behavioral task
behavioral1
Sample
MT103 PAYMENT_ANCHORS_4263782872.pdf.js
Resource
win7-en
Behavioral task
behavioral2
Sample
MT103 PAYMENT_ANCHORS_4263782872.pdf.js
Resource
win10v20210408
General
-
Target
MT103 PAYMENT_ANCHORS_4263782872.pdf.js
-
Size
205KB
-
MD5
f924ea1d9a529af64d57c5daa6f55bab
-
SHA1
e39ec476abb7acce4e713f15fb121ceed72b12c2
-
SHA256
872339e661e1a90638d6981b8b09d56cccebdfdfad0fabb2c5100f4c05bccce7
-
SHA512
3d59266b9bbfa01dd4c694faa42f53d8c87eae2698cfdfdd941eaa6cfaeeb2383c0fdf4deb32f4c0ecaf8ffa671737ee7d6acbd186ef8ee3c0ef85e79719140c
Malware Config
Signatures
-
Blocklisted process makes network request 17 IoCs
Processes:
WScript.exeflow pid process 9 3984 WScript.exe 17 3984 WScript.exe 19 3984 WScript.exe 20 3984 WScript.exe 21 3984 WScript.exe 22 3984 WScript.exe 23 3984 WScript.exe 24 3984 WScript.exe 25 3984 WScript.exe 26 3984 WScript.exe 27 3984 WScript.exe 28 3984 WScript.exe 29 3984 WScript.exe 30 3984 WScript.exe 31 3984 WScript.exe 32 3984 WScript.exe 33 3984 WScript.exe -
Drops startup file 2 IoCs
Processes:
WScript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LQlAlqxPqv.js WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LQlAlqxPqv.js WScript.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
WScript.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\SEJOKAOI5S = "\"C:\\Users\\Admin\\AppData\\Roaming\\LQlAlqxPqv.js\"" WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 496 3584 WerFault.exe javaw.exe -
Modifies registry class 1 IoCs
Processes:
wscript.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings wscript.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
WerFault.exepid process 496 WerFault.exe 496 WerFault.exe 496 WerFault.exe 496 WerFault.exe 496 WerFault.exe 496 WerFault.exe 496 WerFault.exe 496 WerFault.exe 496 WerFault.exe 496 WerFault.exe 496 WerFault.exe 496 WerFault.exe 496 WerFault.exe 496 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
WerFault.exedescription pid process Token: SeDebugPrivilege 496 WerFault.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
wscript.exedescription pid process target process PID 664 wrote to memory of 3984 664 wscript.exe WScript.exe PID 664 wrote to memory of 3984 664 wscript.exe WScript.exe PID 664 wrote to memory of 3584 664 wscript.exe javaw.exe PID 664 wrote to memory of 3584 664 wscript.exe javaw.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe "C:\Users\Admin\AppData\Local\Temp\MT103 PAYMENT_ANCHORS_4263782872.pdf.js"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:664 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\LQlAlqxPqv.js"2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
PID:3984 -
C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe"C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\rszwtlnvhf.txt"2⤵PID:3584
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3584 -s 3603⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:496
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
60b4571a8ea0c638af1345fc7a0a3c83
SHA1982907d9eb4134ff8f49c9b77006c26b71275a2e
SHA256548dd0948082a5cf5bbb25c171cc0f49b59bcad7b89b5c450e5818292e500711
SHA512e1110e8478db3a2fe1f4db2b2941fa5684cb0f52cce314a1d365b5ae21fee40ef6f6ae4aa390e461b59f594612dcb0038c47da457cbb9dad6bf6ffa7448e423b
-
MD5
2e458a59025b390fbdf7d3717314b507
SHA1d5a84f501bfa81682ebde5e31a68794140141785
SHA2566b723bd260b53c68c716ef218c78718d3e99ab4d4238a4bd823fd0cd6ec8007b
SHA5122b463bc4ef98264560abad47053549c463fc9ee098c97cd60d58c959ba67f4ddf2ca60856f6564802a9f056740fbedbb6bdc829388c136c13b334563465d1f22