Analysis
-
max time kernel
144s -
max time network
154s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
07-09-2021 01:36
Static task
static1
Behavioral task
behavioral1
Sample
新命令__________.PDF.js
Resource
win7-en
Behavioral task
behavioral2
Sample
新命令__________.PDF.js
Resource
win10v20210408
General
-
Target
新命令__________.PDF.js
-
Size
207KB
-
MD5
9154158d95df39303de36b475a790529
-
SHA1
b79ad43d110887b9302bbfca092517a1fb0f43f3
-
SHA256
ce8e23a1309e4fbe54a48d36c5c68af97df72073acce4a930df3246a34a75f32
-
SHA512
de36f4d45c7b03f8cb70498bfd7a9285303814eb20a9a7f09a7855db6daacf817e4e6a0f63f6e63dd46b8bff7d4704155daa4fb2e9ca5a4902957dead3ee7a82
Malware Config
Signatures
-
Blocklisted process makes network request 18 IoCs
Processes:
WScript.exeflow pid process 6 3948 WScript.exe 17 3948 WScript.exe 18 3948 WScript.exe 19 3948 WScript.exe 20 3948 WScript.exe 21 3948 WScript.exe 22 3948 WScript.exe 23 3948 WScript.exe 24 3948 WScript.exe 25 3948 WScript.exe 26 3948 WScript.exe 27 3948 WScript.exe 28 3948 WScript.exe 29 3948 WScript.exe 30 3948 WScript.exe 31 3948 WScript.exe 32 3948 WScript.exe 33 3948 WScript.exe -
Drops startup file 2 IoCs
Processes:
WScript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WOChiHyFPM.js WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WOChiHyFPM.js WScript.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
WScript.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\SEJOKAOI5S = "\"C:\\Users\\Admin\\AppData\\Roaming\\WOChiHyFPM.js\"" WScript.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2856 4012 WerFault.exe javaw.exe -
Modifies registry class 1 IoCs
Processes:
wscript.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings wscript.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
WerFault.exepid process 2856 WerFault.exe 2856 WerFault.exe 2856 WerFault.exe 2856 WerFault.exe 2856 WerFault.exe 2856 WerFault.exe 2856 WerFault.exe 2856 WerFault.exe 2856 WerFault.exe 2856 WerFault.exe 2856 WerFault.exe 2856 WerFault.exe 2856 WerFault.exe 2856 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
WerFault.exedescription pid process Token: SeDebugPrivilege 2856 WerFault.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
wscript.exedescription pid process target process PID 628 wrote to memory of 3948 628 wscript.exe WScript.exe PID 628 wrote to memory of 3948 628 wscript.exe WScript.exe PID 628 wrote to memory of 4012 628 wscript.exe javaw.exe PID 628 wrote to memory of 4012 628 wscript.exe javaw.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\新命令__________.PDF.js1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\WOChiHyFPM.js"2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
PID:3948 -
C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe"C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\pkbblnve.txt"2⤵PID:4012
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4012 -s 3563⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2856
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
5f1405a47e8cf0bc0188332a4a791761
SHA1638fe4be43f13d79266be5ee35b7879fdeafc71a
SHA256d9d12a49414db2909da558bed4013e0987fe61140f3c4e17501800ac32d422f7
SHA512d2e722dea389123c24534bc661352a7bf42188b47428bb24f1507db4b68f0d47e49b3f95d8cab3f7d5470aa31f51fa72be5d63a4560e785d04860d2a5bd54313
-
MD5
2e458a59025b390fbdf7d3717314b507
SHA1d5a84f501bfa81682ebde5e31a68794140141785
SHA2566b723bd260b53c68c716ef218c78718d3e99ab4d4238a4bd823fd0cd6ec8007b
SHA5122b463bc4ef98264560abad47053549c463fc9ee098c97cd60d58c959ba67f4ddf2ca60856f6564802a9f056740fbedbb6bdc829388c136c13b334563465d1f22